Wednesday, August 29, 2001
Tuesday, August 28, 2001
We regret to inform you that Flooz.com, Inc. has ceased operations. The offices are closed and the company will file for bankruptcy protection.
Flooz.com has been adversely affected by dramatic changes in capital markets and the general slowdown in the economy. Flooz.com had been in merger discussions with a number of companies but was unable to find a suitable partner.
We wish to thank all of our customers, merchant partners, service providers, employees and investors for their support.
The idea of online currency is not flawed; what IS flawed are the perceptions of people; they have no imaginations, and don't understand that the paper in thier pockets is IDENTICAL (and ultimately inferior) to a chaumian online currency. This is the first generation of companies; the next generation will probably get the public education right, and create some very rich people...
Monday, August 27, 2001
Friday, August 24, 2001
"AbandonWare"
A petition that urges software makers to release their obsolete titles into the public domain as freeware.
http://mivox.com/essays/text/petition.html
In an interview with John Lydon:
Does it depress you that ultimately you changed nothing and British culture in the 21st century is now the essence of tedium, banality and mediocrity?
Oh, I disagree, I changed everything and then it all went back. That isnt my fault. Its for the next lot to come up with their stuff. I'm not waving no big flag for you all to stand behind. I'm not the leader; there are no leaders. We all lead ourselvs individually. Life is bad when you don't do fuck all about it. But somethihng will come out of it, I dont know what. I hope so at least, and if it doesnt, its tough tits because I've done my bit and now its your turn mates. You can't just leave it all up to just one bod, or a group of people. That's selfish and lazy. Followers are the very people, from the Sex Pistols onwards, that I dislike the most, because they're sheep. They're living their lives through you and thats wrong. Respect what I do, but dont bloody live in it or copy it, imitate it.
From the new "year zero" magazine
Thursday, August 23, 2001
Tuesday, August 21, 2001
A212 ver. 2
325 Songs, 1:06:27:39 total time, 1.60 GB
>>>The new version of A212 is now available.<<<
You can get it like this:
Refer irdial list to five of your friends by clicking here.
Send three blank CDRs in thier original packaging.
Send enough postage for us to return the CDRs to you, in UK stamps or International Reply Coupons.
Send us a 10 donation to the server fund (optional)
Post everything in a recyclable Jiffy bag.
Love us unconditionally.
The new A212 comes with an HTML interface, newly ripped items from the venerated Irdial-Discs catalogue and newly crafted artists biogs.
Upgrade your old version of A212
If you have a previous version of A212, you can get an upgrade disc. This disc contains the new rips, HTML and directory structure so that you can fuse the old version with the new version. To get an A212 upgrade disc, send one blank CDR in its original packaging, IRCs or return postage post everything in a recyclable Jiffy bag, with a 5 donation to the server fund (optional).
If you have any problems, questions you can always email us....
***FOR IMMEDIATE RELEASE***
August 16, 2001 � Beverly Hills, CA
Do your kids know what a UFO is? Have they ever seen one? Have you ever
briefed them on the subject of your investigations?
Let best-selling children�s book author Eric Elfman do it for you. Elfman�s
new book, ALMANAC OF ALIEN ENCOUNTERS, just published by Random House,
outlines the fascinating history of UFOs in a chronological overview that
kids will find gripping.
The Almanac of Alien Encounters is an in-depth, thought-provoking look at
classic unsolved sightings and close encounters with extraterrestrials, along
with other related phenomena such as ancient astronauts, crop circles, the
Face on Mars, cattle mutilations, and much more. The book also details the
U.S. government�s official response to UFO reports, as well as a look at
science�s more cautious approach to alien encounters: SETI, the on-going
Search for Extraterrestrial Intelligence.
�I have never seen a book on the young adult level which provides so much
information to the young reader in such a simple, yet adult-like, manner. The
book gives an excellent overview of the early flying saucer sightings, from
prehistory right up to the present. Having a section on what to do if you
see a UFO is encouraging to us UFO investigators.�
-- Raymond W. Cecot, Organizational Director, IRAAP
Whether your kids are dedicated skeptics or True Believers--and from his
visits to schools, Eric has found that kids span the spectrum--they�ll find
something in the Almanac to make them think, make them laugh, send a shiver
down their spine, and spark their curiosity about the universe around them.
And most important of all, this book is sure to get even the most reluctant
readers reading!
The Almanac of Alien Encounters is available at all major bookstores, as well
as from www.amazon.com. It has been published both in paperback and in a
more-durable hardcover �library binding�.
Eric Elfman is the author of eight books for children and young adults,
including three X-Files novelizations and the award winning �Almanac of the
Gross, Disgusting & Totally Repulsive.� He has written for television and
film, and currently has several TV projects in the works. His website,
www.elfmanworld.com, describes his books in more detail, and also contains
lots of gross facts, scary stories, and other fun and educational material
for kids.
Eric is available for interviews, conferences, on-line chats, and can provide
kid-friendly articles for your newsletters and websites. Please feel free to
contact him if you have any questions or comments at eric@elfmanworld.com.
Friday, August 17, 2001
nyc smile on me....as i'm leaving!!!
off to canada today for good. bye bye imperalist
pigdogs! as soon as i cross the peace arch
i plan to shoot the finger right back east at
washington.
thank god i no longer have to feel the embarressment of
being american. and for those of you still in the states
beware the coming fall of the empire. i can gaurentee you it
won't go down without kicking and screaming....or worse.
http://www.villagevoice.com/issues/0133/meyers.php
NYC Village Voice
Week of August 15 - 21, 2001
Motley Crew Beams No-Cost Broadband to New York
High Speed, Freed
by Peter Meyers
"This is why I love New York," says Anthony Townsend, standing in
the middle of Washington Square Park, holding his laptop computer
like a butler's tray and scanning the adult playground the place
becomes on hot summer evenings. Where else, he asks, can you
walk around with a computer, surf the Web, and go utterly
unnoticed?
As if to prove his invisibility, or perhaps to demonstrate that he belongs, he
hoists his machine like some digital prayerbook and begins chanting: "Jesus!
Jesus! Thank you!"
No one�not the guy playing the Ramones on acoustic guitar, not the tonguing
teenage lovers�notices this modern miracle worker or the cybernet he has cast
around them. Along with some 30 other volunteers in a group called NYCwireless,
Townsend's on a crusade to set up wireless Internet access zones: small areas,
often called free networks, where people can tap into high-speed connections,
without cables or phone lines, at no cost.
Call it a marriage of the Web and pirate radio, forged even as big telecom
interests bicker over the rights to wireless-spectrum licenses. Last week, the
White House announced it would ask the Supreme Court to uphold the seizure of
licenses from Next-Wave, which bought them at auction but failed to make
payments.
Meanwhile, the Washington Square network already exists�thanks to a homemade
setup Townsend rigged in late July in his nearby office at NYU, where he's a
fellow at the Taub Urban Research Center. Townsend, 27, used an antenna to
broadcast his connection a few hundred feet out into the park. So far only a
handful of these networks have been activated in New York. But if the group has
its way, zones like these will soon be springing up everywhere, spreading Net
connections like streetlamp light to anyone willing to put a cheap plug-in card
into a computer.
Aside from the opportunity to perform evangelical chants, why, you might ask,
would Townsend and his friends do this?
For starters, they have an earnest desire to share, a hacker's love of all
things jury-rigged, and an almost quixotic yen to make connections�human links,
as it were�in an impersonal city. Yet the simplest explanation is that they do
it because they can.
Building a free network requires some expertise, but using one is almost easy.
Those who wish to log on simply need to slip a "WiFi" card�which contains a
mini-antenna, costs about $100, and is available at computer shops�into a slot
on their machine and enter a few basic settings. Then they can cruise the
Internet and send e-mail as they normally would. The NYCwireless Web site,
www.nycwireless.net, lists a handful of the currently active networks.
Sharing resources like this is a longstanding tradition within the technology
world, from kids swapping music to programmers teaming up to improve Linux.
That's what attracted Terry Schmidt, an independent consultant, who joined
forces with Townsend this spring. Schmidt, 25, says he wanted to contribute his
know-how to a group effort. "I wanted to give something back," he says.
But free things draw suspicion these days, now that share-the-wealth movements
like Napster have acquired the taint of the mass-looting spree. Schmidt, who
along with Townsend acts as an informal spokesperson for NYCwireless, firmly
rejects the Napster comparison and says his group is simply giving the bandwidth
they pay for to anyone who happens to be nearby. "I'm sharing it with people,"
he says. "I'm not selling it. I'm not making a profit off it."
Which doesn't make Internet service providers any happier. Though most broadband
companies don't seem much aware of free networks, a Time Warner Cable
spokesperson says such sharing could violate the terms of its residential-
subscriber agreement.
In any case, Schmidt says he spends lots of time attempting to explain that this
is not some new dotcom business idea, that there is no commercial hook beneath
the giveaway lure. At a recent tech convention in Las Vegas, he tried again.
"They would ask, 'What's the business model?' " he recalls, "and we'd say,
'There is no business model. It's free.' "
Those in the free-network community, both in New York and elsewhere, treat the
project mostly as a hobby. Part of this reluctance stems from wanting to avoid
the responsibilities of running a business. If no one gets charged, then no one
can complain when things don't work. And by not charging, they're much less
likely to draw the attention of those supplying the bandwidth they're sharing.
But it's also evident that a communitarian impulse powers their most ambitious
vision, of a city blanketed with public Internet access.
"I want to make it an attractive thing for everybody to use. I want to make it
easy," says Schmidt, who thinks broadband connectivity is close to becoming as
necessary as water or electricity, and as such should be in public places, as
available as drinking fountains.
On May 3, Schmidt got the first NYCwireless network up and running in a coffee
shop near his Upper East Side apartment. "Basically, that was a nightmare," he
says, sounding as genuinely disturbed as a horror movie fan spooked by a scary
flick. Convincing the shop was not a problem. As he told the management, the
project would cost them nothing, require no work on their part, and enable their
customers to surf the Web for free. The problem was that between Schmidt's place
and the caf�a distance of about 100 feet as the crow flies�stood several 16-
inch-thick brick walls and enough curves to exhaust even the strongest radio
wave.
First, Schmidt experimented with a variety of powerful antennas and signal
amplifiers, all of which, given unobstructed views, can be used to propel a
signal many miles. No luck. Then the brainstorm hit. The handiest solution to
the wireless network, he realized, was to run a wire. Off he went to Home Depot,
where he bought 250 feet of Ethernet cable to pipe the broadband connection from
his apartment to an access point in the coffee shop, which would in turn
distribute the signal. After securing permission from his landlord�who also
owned the coffee shop's building�he set about finding a means to get the cable
through those walls.
Enter Schmidt's friend who works as a metal fabricator. He customized the bit
needed to bore a slender channel through such thick walls, leaving only the
matter of drilling the actual hole. For this Schmidt used a hammer drill, which
is kind of like a jackhammer for the do-it-yourself crowd. Schmidt was then able
to run the cable from his apartment to the shop, where he snaked it into a
Rubbermaid container that held the miniature broadcast antenna.
In some ways that's when the real work started, as group members were forced to
grapple with the question of what their wireless network might evolve into and
how it might be used. Townsend, the urban planner, has visions of location-based
services delivering information to people according to where they are. But he
admits to not knowing exactly how a large-scale system of free networks will
function. "What we're doing is building an infrastructure," he says, confident
that once it's in place people will figure out things to do with it�especially
once they start carrying handheld computers with wireless connections.
Creating a truly widespread system will take more than a handful of volunteers.
The most optimistic members of NYCwireless talk of a "cloud" of free WiFi
networks filling the skies of New York City with Internet connectivity. As it
turns out, thousands of private corporate networks already exist, having been
designed to give employees wireless broadband connections.
Those in NYCwireless know this is so because a member recently went out "war
driving," a method for detecting active WiFi networks that involves outfitting a
car with global positioning technology, a hood-mounted antenna, and a suite of
special software. The term comes from "war dialing" (popularized in the Matthew
Broderick movie War Games), in which phone number after phone number is
automatically dialed in the search for a modem.
War driving is of interest to the free-network movement for two reasons: It
helps demonstrate the ubiquity of WiFi networks and exposes the security
problems that need to be addressed for the networks to be secure and,
potentially, more popular. The drive through Manhattan, which covered only a
portion of midtown, identified approximately 1400 WiFi networks.
Though many of these networks were inaccessible to the average WiFi card-
carrying computer user, anyone with a little networking savvy could likely break
in. Security flaws are as much a concern to free-network operators as they are
to their corporate counterparts, since network abuse�sending out spam or
threatening e-mail�could lead to their being shut down. War driving helps raise
awareness within the tech community that these networks are not yet secure.
Ultimately, a more pressing question is whether ordinary people will start using
these free networks. According to Schmidt, three months after establishing the
access point, only about one person per day taps the connection. Hooking up,
after all, requires someone with not only the wherewithal to buy a wireless card
but also the desire to play with what many people see as a work tool.
Whether these free zones flourish remains to be seen. But by another measure the
effort is already a success. Adam Shand, a Portland, Oregon-based advocate of
the movement, observes that "computers are fundamentally an isolating
technology."
Because the Internet helps connect people at a distance, the computer-dependent
have spent less time hanging around each other. Wireless free networks�both
because of the work required to build them and the signal's limited range�could
bring back the fun of being together. Rather than seeking an escape from 24/7
Web access, people could leave their desks and wander out to the digital
commons, no longer isolated.
Back in Washington Square Park, Townsend's just happy everything checks out. He
tests the first live feed of streaming video. It's of a teenage girl on CNN,
talking about what Ecstasy did to her. "I didn't care about anything except
doing X," she says. "I didn't want to wake up unless it was to do X."
Townsend stares at the screen. "This is fucking cool," he says. "This is better
than 3G"�the high-speed network cell phone companies are hyping. "That's not
even half the speed of what we're getting. And it
works."
Dont upgrade to IE5.5 SP2
This concerns Internet Explorer 5.5 SP2. For those of you who don't know:
"SP" is Microsoft lingo for "service pack", which is their stupid code
phrase for upgrade. This is different from IE 6 (which is currently in
beta).
Short version: with no warning to the dev community, MS is covertly
dumping support for any plugins that do not support their own proprietary
model -- which is a lot of damned plugins. Quicktime is perhaps the most
prominent one but, as you can see from the last paragraph below, this also
impacts some database applications and other mission-critical
implementations of online tech. Methinks other problems will also be
discovered before long.
It's obviously part of their endgame strategy to finally kill Netscape,
Mozilla and other browsers.
---
from http://www.macfixit.com/
IE for Windows blocks QuickTime
Robin Walker found that Internet Explorer 5.5 SP2 for Windows is
incompatible with QuickTime: "It will not play QuickTime movies, or work
with any other function that requires the QuickTime plug-ins. QuickTime
plug-ins play QT movies in other versions of MSIE up to and including MSIE
5.5 SP1, but SP2 just gives a blank frame or broken graphic icon. This has
been verified here with Win98, WinME, WinNT, and Win2K. The same problem
with QuickTime is reported to be present in the previews of MSIE 6.0 for
Windows. The QuickTime plug-ins continue to function correctly in Netscape
and other browsers." In addition, MacNN has posted an item which appears
to confirm Robin's observation. It states that "A note from Apple
engineering staff to the QuickTime VR mailing list says that 'IE 5.5 SP2
[for Windows] will not use the QuickTime plug-in no matter what you do.'"
Update: Jim Gaynor writes: "IE 5.5 SP2, apparently, isn't singling out
QuickTime. It seems that Microsoft dropped support for plug-ins written to
the Netscape standard, and is now only supporting ActiveX plug-ins. Here
at the University of Washington, several groups have been told not to
upgrade, as certain plug-ins that are used for our in-house databases
break under IE 5.5 SP2."
Thursday, August 16, 2001
House music causes impotence
Italian psychologists House music causes temporary impotence, Italian researchers claim. Research conducted by psychologists at the Help Me association in Rome found 66% of Italian youngsters suffer sexual problems after listening to the music. The survey was conducted on 500 Italian clubbers aged 16 to 24. Psychologist Willy Pasini told the News 2000 website: "The strong rhythmic component, and the almost total lack of melody do not inspire sexual thoughts in one's mind." The researchers claim house music cause "mental impotence" because it doesn't leave room in the brain for sexual desire. "Music heard in the clubs causes an alternate state of consciousness, which distracts the brain from taking care of its vital functions", researcher Chiara Simonelli said. Claus, I HAD to post this; its just TOO FUNNY!
I spoke to a fruity cellular telephone company today about integrating SMS into P2PQ.
When I got through to the switchboard, the woman said to me; "Can you tell me what SMS is? I've only been here two weeks"
I then was put through to another woman, who, after putting me on hold three times, gave me the free number that is used to sign up to Orange!
**** **** MAJOR PROTON EVENT IN PROGRESS **** **** A category S2 (Moderate) Solar Radiation Storm is in progress. This event began with high energy proton flux above event levels at 7:05 p.m. Mountain Daylight Time (MDT) on August 15, 2001. Current proton fluxes are at a level equivalent to S2 (Moderate) on the NOAA Solar Radiation Storm scale. Effects may include, but are not limited to, single-event upsets on satellites in earth orbit, and degradation of high frequency radio communications at polar latitudes, also known as Polar Cap Absorption (PCA). The NOAA S-scale is defined by the lower energy proton flux (10 MeV), but because this event also includes a significant higher energy flux component (100 MeV), other effects are also possible, including increased radiation exposure for manned space flight operations, more widespread radio communication effects, and a wider range of potential impacts on satellites, such as "snow" in imaging systems and degradation of satellite components due to radiation exposure. Major proton events generally follow energetic x-ray flares from active sunspot regions on the visible side of the sun. This event was somewhat unusual in that no notable x-ray enhancement was seen on satellite monitors prior to its occurrence, suggesting a more unusual "backside" event, from a sunspot region that has rotated beyond the side of the sun facing Earth. Subsequent imagery received from the LASCO instrument on the SOHO satellite, operated by NASA/ESA, confirm that a major coronal mass ejection (CME) emerged from a backside source starting at about 5:54 p.m. MDT on August 15th. Proton enhancements were first observed on the SOHO SIS instrument at 6:25 p.m. MDT, indicating that these particles were ejected from the sun at a velocity near 30% of the speed of light. By 7:05 p.m. MDT, the flux of energetic protons observed on the NOAA GOES-8 satellite had risen to the threshold for a major proton event (as determined by 100 MeV proton flux). A second threshold for lower energy protons (10 MeV proton flux) was reached at 7:35 p.m. MDT. An associated Polar Cap Absorption (PCA) began at 8:10 pm MDT. The last S2 (Moderate) event with flux levels similar to the one in progress occurred on 18 April 2001, and lasted for about two days. Interestingly, that event was also caused by a backside CME.
Wednesday, August 15, 2001
in the These records catalog posted on the Irdial site:
This Heat records "Blue & Yellow" and "Deceit" are listed as "due later in the year... compact disc and vinyl remasters / repackage"
does any one know the status of these?
i've gotten _some_ of the mp3s from Gnutella, but would love to get my hands on physical releases...
Monday, August 13, 2001
http://www.hindustantimes.com/nonfram/100801/platefrm.asp
August 10, 2001
Ravi Visvesvaraya Prasad
THE LASHKAR-e-Tayyeba militants responsible for the Red Fort attack
were running a cybercafe and using electronic mail to receive
instructions from abroad.
When the Delhi Police seized their computers and hundreds of encrypted
e-mail messages, they found a vast amount of pornographic films and
photographs on the hard disks. Thinking that the militants had amassed
their pornographic collection for personal enjoyment, the police
turned it over to the maalkhana as case property.
A few weeks later, a police officer in Delhi read in the USA Today
about the testimony furnished by George Tenet, Director, CIA, to the
US Congress. Tenet said that Islamic extremists were hiding their
messages within pornographic and sports images and movies, as well as
in music files, and were utilising heavily-visited electronic chat
rooms and bulletin boards as drop sites.
The intended recipient would download the file and decrypt the hidden
message. To all others who would download that file, it would seem to
be an innocuous image. Tenet was alarmed that the extremists had
successfully evaded the SIGINT (signals intelligence) and COMINT
(communications intelligence) interception operations of Americas
National Security Agency.
Hence, it occurred to this alert policeman in Delhi that the
pornography seized from the militants could contain hidden
instructions.
These developments have drawn attention to the recondite field of
steganography, the science of concealing encrypted messages within
innocuous cover messages, pictures or music in such a manner that an
interceptor or other recipients of the cover file would not even
suspect that hidden within it was an encrypted message.
In the simpler field of cryptography, an interceptor would be able to
discern that the encrypted message existed, and his challenge would be
merely to crack the code and decrypt the secret message; even this
simple task would take the best security agencies several weeks to
perform. The US Air Force Research Laboratory has forecast the future
information warfare technologies and the counter measures to fight it.
Steganography topped the list.
While the fundamentals of steganography were enunciated by Johannes
Trithemius of Frankfurt, it is in the last 18 months that
technological advances have taken place, mainly at German, Austrian,
Swiss, Italian and Finnish universities, Cambridge University in the
UK, and Carnegie Mellon and George Mason Universities in the US.
Security agencies have been rendered impotent by the inexpensive
steganographic software packages which conceal information in digital
audio, video and image files.
The first organisations to recognise the utility of steganographic
algorithms developed in European universities were Pakistani hacker
groups, the Palestinian cells of Hamas and Hizbollah, Osama bin Ladens
Al Qaida, and the LTTE. Al Qaida heeded bin Ladens directive that
mastering advanced technologies was integral to jehad. It was the
first to practise the research results of Professors Ross Anderson and
Fabien Petitcolas of Cambridge University, and conceal its messages in
dense packet internet traffic, and large bandwidth uncompressed audio,
video and image files.
These would be located at heavily visited pornographic sites, music
download sites, chat rooms and bulletin boards. Al Qaida began to use
these as message drop sites for their agents. A security analyst
detected steganographic activity even on heavy-traffic commercial
portals such as Amazon and eBay, who were not even aware that their
websites were being used for such purposes.
A security analyst recounted the case of a suspected Islamic militant.
The FBI in the US, which had placed him under surveillance using its
packet-sniffing tool Carnivore, was intrigued that while he kept
e-mailing photographs of his family to e-mail addresses that appeared
to be those of relatives, he never received any replies. He was found
to be sending instructions to his agents using DEMCOMs Steganos, which
was undetectable by FBIs Carnivore.
Packages that combine technical excellence with human psychological
factors to avoid suspicion are Texto, developed in Finnish
universities, which converts messages into blank verse poetry, and
Spam Mimic, developed by Peter Wayner, which encodes messages into
what looks like a junk e-mail.
While round one has gone to the terrorists, Indian security agencies
can fight back. Compressed video, music and image files have
predictable patterns that would be disrupted when a message is
inserted. It is possible to develop a stegoscanner program, akin to a
virus scanner, to examine hard drives and identify the electronic
fingerprints and signatures left behind by steganographic
applications.
A US steganography expert has formulated a roadmap for future efforts:
First, derive the signatures/indicators associated with each
steganographic package and write a scanner. The harder part is picking
up the dead drops. This would require thousands of police officers to
continuously monitor the websites, bulletin boards and chat rooms. The
next stage is difficult. Once all possible nodes are identified, one
should write a Trojan horse that would sit in the machines and scan
all activity.
Indias security agencies should utilise the latest steganographic
technologies for their internal communications, in contrast to the
insecure channels they use at present. They should also develop the
futuristic science of detecting these hidden messages and decrypting
them, in order to trace sensitive information being leaked out under
innocuous guises. For these, they should work together with the IITs,
just as the Center for Secure Information Systems in the US is a joint
venture between the National Security Agency and the George Mason
University. The Pentagon and CIA are funding steganalysis research at
the Carnegie Mellon.
If Osama bin Laden and the LTTE can put into practice the latest
technological breakthroughs from European universities, there is no
reason why India should not use its academia and industry. The
intelligence agencies should, for instance, examine the hard drives of
those Sudanese associates of bin Laden whom they caught some time
back.
Friday, August 10, 2001
XXXXX SUNDAY, AUGUST 12 XXXXX
Share: A Place for Portables, Laptops, Powerbooks
Data exchange, mp3 djing,
performances. Actually speak to and see the people you are networking
with. Wow computers and a social life. At the same time no less.
A laptop-only live performance series, so all laptoppers can actually
experience each other's audio performance and exchange more ideas. If
you have any portables, bring it under your arm! But if you're a
super muscular person and willing to bring the desktop, that's
acceptable. I guess. Otherwise, everything's acceptable -- Windows,
Mac, Linux! Hey, Palm Pilot/Visor warriors, bring it in if you have
some nifty sound-network performance solution! Share and expand more,
seems to be the very base philosophy behind this. Eventually all the
attendees will be networking and create a huge laptop jam.
Open Air
121 St. Marks, between 1st and A avenues
new york city
Continues every Sunday
4-9p; $free
XXXXXXXXXXXXXXXXXXXXXXXXXXx
Thursday, August 09, 2001
Never mind posting keys online, if you simply take the audio out of your dataplay device and plug it into your soundcard, you can rip the output to mp3 or whatever, and then the sound is free and clear to copy ad nauseum. Once again: Trying to make digital information uncopyable is like trying to make water that is not wet. Whats incredible, is that these people actually get tens of millions of dollars in investment to produce this junk.
Tuesday, August 07, 2001
dataplay?
mmm yeah, uh see ya in a year dataplay "DOT COM".
where are the ideas these days?
right here!!!!!!!
"This whole music piracy problem isn't going to go away until the CD dies," said Talal Shamoon, senior vice president at InterTrust. "A lot of these music subscription services and download services that have been put together...are great, but they're not an effective replacement for a new entertainment experience because CDs are still here, and CDs define the path."
Here we go again!!
Monday, August 06, 2001
Saturday, August 04, 2001
Someone smart said:
Or download free stuff from MP3.com.
It's not like the bands the RIAA push onto us are significantly better than most of the better artists on MP3.com, anyway.
This raises a very good point. If RIAA's music control fails, and the consumers route around the damage, buying CDs in the Bahamas for artists who are willing to list MP3 songs so we can try them out, it really doesn't matter what Congress tries to do.
In the end, the market has no soul, no love for RIAA and the corporate music scene. If they increase costs and try to closed source their music, open source music alternatives will become more attractive. If I'm into Techno and they try to charge me USD$20 for a CD of 10 songs, when I can get decent (if not better) quality Techno for USD$0 for tryout and USD$0 for one or two sample MP3 songs (full length), then I'll send them USD$10 for the 10 song CD. Cost to band - USD$7 for production, shipping, handling, MP3.com split. Profit to band - USD$3. Profit under RIAA USD$20 CD to band is USD$0.20 at most. If you're a techno band and you can sell 2 million CDs with USD$3 profit or choose to sell 1 million CDs via RIAA groups for USD$0.20 profit, which will you choose?
Right, you choose open source, cause you get more fans, more net dollars to band, and you also get the charts of where your CDs sell the most to plan tours with and can then email those fans and crash at their places.
The market wins, open source wins, RIAA loses.
Thursday, August 02, 2001
You need this red button!!!!!
http://www.anonymizer.com/
UPDATED
Actually, this button anonymizez pages, but BLOCKS lots of interesting URLs based on keywords (aparently) so, actually, it SUCKS! use SafeWeb instead; free and no censorship.
Wednesday, August 01, 2001
If any of you have been reading the papers, the 180° that the Sun did for example, was quite simply breathtaking. It was absolutely clear that NONE of the journalists that wrote about the programme actually saw it.
There is also a very interesting facet of this whole sad saga that no one has touched upon yet; the Home Secretary David Blunkett is blind. There is no reason why he should not be Home Secretary, but some interesting situations are bound to arise in his job, since he has to make determinations on obscenity. How will he determine wether a picture or film is obscene? In the case of the Brass Eye episode, he had the programmes contents desctribed to him.
Surely, someone is going to argue that he in fact cannot make a judgement on what is or is not obscene because he cannot see the porn to determine wether it is likely to offend public morals. A section of Brass Eye had a customs official making an on the spot determination of wether or not a two foot tall picture of a childs head on the body of a 4 inch tall naked woman was obscene or not. It was totally hilarious. When the same head was put onto a different, but totally absurd picture featuring "bigger naked parts" the official said that it was obscene!
Someone is going to raise this point eventually; even when the officials can see, the standards that they apply to determine what is in violation of obscenity laws are clearly absurd. There has never been a time in the UK where so many elements are in place at the same time, the combination of which could destroy the obscenity laws once and for all.
Subscribe to:
Posts (Atom)