Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Cryptome in Hot Water Again

ScuttleMonkey posted more than 4 years ago | from the revel-in-the-bulls-eye dept.

Crime 241

garg0yle writes to tell us that Cryptome appears to have stepped in it again with a recent leaked document concerning Microsoft's "Global Criminal Compliance Handbook." "Microsoft has demanded that Cryptome take down the guide — on the grounds that it constitutes a 'copyrighted [work] published by Microsoft.' Yesterday, at 5pm, Cryptome editor John Young received a notice from his site’s host, Network Solutions, bearing a stiff ultimatum: citing the Digital Millennium Copyright Act (DMCA), Network Solutions told him that unless he takes the 'copyrighted material' down, they will 'disable [his] website' on Thursday, February 25, 2010. So far, Young refuses to budge." In a gesture of goodwill, Wikileaks has offered to host Cryptome via their twitter feed.

cancel ×

241 comments

Sorry! There are no comments related to the filter you selected.

Already gone? (5, Informative)

tomalpha (746163) | more than 4 years ago | (#31265658)

Looks like DNS has already gone...

Searching for cryptome.org. A record at G.ROOT-SERVERS.NET. [192.112.36.4] ...took 31 ms
Searching for cryptome.org. A record at D0.ORG.AFILIAS-NST.org. [199.19.57.1] ...took 9 ms

Nameserver D0.ORG.AFILIAS-NST.org. reports: No such host cryptome.org

Re:Already gone? (3, Informative)

Eristone (146133) | more than 4 years ago | (#31265706)

According to the take down notice and response from Network Solutions, they do this for 10-14 days because cryptome.org refuses to take down the "offending" document. If there's no legal response to the DMCA Counterclaim from Microsoft (response being the filing of litigation) in the next 14 days, cryptome.org will be released back into the wild.

Re:Already gone? (5, Informative)

Anonymous Coward | more than 4 years ago | (#31265772)

The document is already available via wikileaks [wikileaks.org] .

Re:Already gone? (1)

TJamieson (218336) | more than 4 years ago | (#31265712)

Yep, the host already caved. Wikileaks is already mirroring the document; I don't want to hotlink the PDF and melt their servers :)

Re:Already gone? (0)

Anonymous Coward | more than 4 years ago | (#31265718)

http://downforeveryoneorjustme.com/cryptome.org

It's just you. http://cryptome.org/ [cryptome.org] is up.

But I can't resolve it either. How intriguing.

new mirror (4, Informative)

TheSHAD0W (258774) | more than 4 years ago | (#31265832)

A mirror of the site is now up [siteprotect.net] , with partial content available and the rest being transferred.

Re:new mirror (1)

dave562 (969951) | more than 4 years ago | (#31266178)

The mirror site doesn't have a working link to the document referenced in TFA.

Re:new mirror (2, Insightful)

X0563511 (793323) | more than 4 years ago | (#31266268)

That's probably what the "and the rest being transferred" part is about...

Re:Already gone? (3, Informative)

yenne (1366903) | more than 4 years ago | (#31265964)

Young says there is a “NetSol ‘Legal Lock’ on the domain name to prevent it being transferred to another ISP until the “dispute” is settled; All Cryptome pages other than the home page now generate a 404 message.”

It astonishes me that anyone still uses Network Solutions. Their extensive list of blocks for transferring domain services (read: anytime you'd actually want to, you're prevented) is mind-boggling.

I had several domains with them back when they were the only game in town, and every transfer has been a nightmare that usually involves paying for another year of service before a transfer is approved.

Re:Already gone? (3, Informative)

HeronBlademaster (1079477) | more than 4 years ago | (#31266248)

and every transfer has been a nightmare that usually involves paying for another year of service before a transfer is approved.

GoDaddy does that, but they treat it like an early renewal; that is, they take the existing expiration date, and add a year to it. So technically you're paying when you do the transfer, but you're also adding a year to the expiration date, so really you're just paying ahead of time.

Could that have been the case?

Or... did you mean Network Solutions charged you to let you transfer the domain away from them? Because that would be utterly absurd.

Re:Already gone? (5, Informative)

dgatwood (11270) | more than 4 years ago | (#31266580)

It astonishes me that anyone still uses Network Solutions. Their extensive list of blocks for transferring domain services (read: anytime you'd actually want to, you're prevented) is mind-boggling.

Agreed. It astonishes me even more, however, that an organization like this would do so, and doubly so that anyone in their right minds doing anything more than a personal vanity site would use the same provider for both hosting and domain name registration. That's just asking for a hard-to-fix DMCA shutdown of the site, loss of the site due to the ISP going bankrupt, loss of the domain due to any number of billing disagreements with the ISP that are unrelated to the domain name registration, etc.

AFAIK, the DMCA does *not* provide for locking the domain registration of a claimed-infringing site, only providing for the takedown of the content. However, if your ISP decides it is easier to kill your DNS and lock the domain to prevent transferring it than to muck with your server account, you're stuck. Why? Because you are using the same provider for hosting and (massively overpriced) domain name registration. Don't DO that.

If I were one of these folks, I'd register my domain in a neutral country. For example, you can register .com domains with Gandi.net in France or with NameForName in Russia, or... well, here's a list [icann.org] of ICANN-accredited registrars, most of which support the .com registry. Find one in a country that has as few ACTA-like agreements with the U.S. as possible. Even with the exchange rates as bad as they are, those two I mentioned still charge less than half what NetSol charges for a domain name, with the added security of making it much harder to attack the domain itself with a mere DMCA takedown notice.

cached DNS? (0)

Anonymous Coward | more than 4 years ago | (#31266092)

Hmm, anyone got a cached IP address for cryptome?

Down already (1)

Spad (470073) | more than 4 years ago | (#31265682)

Looks like it's been taken offline already.

Re:Down already (4, Interesting)

Monkeedude1212 (1560403) | more than 4 years ago | (#31265804)

Yeah Network Solutions took them down after Young's counter-response. Wikileaks is hosting it now.

Basically the issue is that Microsoft has a handguide to do some pretty questionable stuff (IP Extraction is mentioned). They can keep it protected from being publicly viewable by putting a copyright on it. Young says that Copyright was not meant for hiding secrets. I agree.

Re:Down already (2, Insightful)

zappepcs (820751) | more than 4 years ago | (#31266206)

Ahhh, the Internet at it's very finest. Social consciousness outing the bad guys. On the other hand, might just be someone who doesn't like MS. Either way, it's misuse of copyright AND this points out the real value of the DMCA, which of course is not to protect the people in any way shape or form. At least, that's how I see it.

Re:Down already (2, Informative)

MidnightBrewer (97195) | more than 4 years ago | (#31266374)

Not meant for hiding secrets, but definitely meant for preventing illegally made copies of a work. This is exactly what copyright is for, whether you like Microsoft or not.

Re:Down already (2, Informative)

khallow (566160) | more than 4 years ago | (#31266392)

Keep in mind that this probably was a legal copy of the work. As has been mentioned elsewhere, Microsoft's work is newsworthy. There is a fair use for such things.

Re:Down already (2, Informative)

flatrock (79357) | more than 4 years ago | (#31266750)

I'm not aware of any fair use rulings that have ever allowed for the broad publication of a complete copyrighted work.

His justification appears to be that although Microsoft is required to comply with the law, they should publish exactly how they comply so that people are more capably of avoiding the governmental eavesdropping.

Basically he's arguing that while complying on the surface, Microsoft should be helping subvert the law at the same time, which would likely land Microsoft in some pretty serious legal trouble.

The public has a right to know what the law allows the government to do. It doesn't have a right to know the specific implementation.

Such back doors do often result in some security risks, however, believe it or not you don't have a right to do penetration testing on someone else's system, even if you use that system.

Re:Down already (1, Insightful)

Anonymous Coward | more than 4 years ago | (#31266416)

Not meant for hiding secrets, but definitely meant for preventing illegally made copies of a creative work.

FTFY

that's illegally made copies of a PUBLISHED work (0)

Anonymous Coward | more than 4 years ago | (#31266466)

for a situation like this it's more complicated, and copyright does not always legally trump the first amendment protection given to news reporting.

As another famous example, see the tobacco industry documents that showed how the industry lied to congress in claiming it didn't know its products caused cancer. Those got leaked and published, the industry sued the guy who published them, they lost, and the documents are still online.

www.cryptome.org: server not found (0)

Anonymous Coward | more than 4 years ago | (#31265694)

Oh well.

Ballsy (3, Interesting)

MonsterTrimble (1205334) | more than 4 years ago | (#31265700)

For Wikileaks to offer to host Cryptome - especially with thei recent troubles.

Really, what we need here is a torrent feed with all the latest stuff.

Re:Ballsy (5, Insightful)

Darkness404 (1287218) | more than 4 years ago | (#31265788)

Really, what we need here is a torrent feed with all the latest stuff.

The thing is, you still need a reliable person to go through it. That is what WikiLeaks was doing before they started begging for money for the past 3 months. There is still always the weak link, and that is the humans need to verify the leaks. Torrents may solve the distribution problem, but lacks absolute security and anonymity.

Re:Ballsy (0, Offtopic)

Strudelkugel (594414) | more than 4 years ago | (#31266148)

undo mod

Re:Ballsy (-1, Offtopic)

Anonymous Coward | more than 4 years ago | (#31265802)

It has come to my attention that the entire Linux community is a hotbed of so called 'alternative sexuality', which includes anything from hedonistic orgies to homosexuality to paedophilia.

What better way of demonstrating this than by looking at the hidden messages contained within the names of some of Linux's most outspoken advocates:

  • Linus Torvalds [microsoft.com] is an anagram of slit anus or VD 'L,' clearly referring to himself by the first initial.
  • Richard M. Stallman [archive.org] , spokespervert for the Gaysex's Not Unusual 'movement' is an anagram of mans cram thrill ad.
  • Alan Cox [microsoft.com] is barely an anagram of anal cox which is just so filthy and unchristian it unnerves me.

I'm sure that Eric S. Raymond, composer of the satanic homosexual [goatse.fr] propaganda diatribe The Cathedral and the Bizarre, is probably an anagram of something queer, but we don't need to look that far as we know he's always shoving a gun up some poor little boy's rectum. Update: Eric S. Raymond is actually an anagram for secondary rim and cord in my arse. It just goes to show you that he is indeed queer.

Update the Second: It is also documented that Evil Sicko Gaymond is responsible for a nauseating piece of code called Fetchmail [microsoft.com] , which is obviously sinister sodomite slang for 'Felch Male' -- a disgusting practise. For those not in the know, 'felching' is the act performed by two perverts wherein one sucks their own post-coital ejaculate out of the other's rectum. In fact, it appears that the dirty Linux faggots set out to undermine the good Republican institution of e-mail, turning it into 'e-male.'

As far as Richard 'Master' Stallman goes, that filthy fudge-packer was actually quoted [salon.com] on leftist commie propaganda site Salon.com as saying the following: 'I've been resistant to the pressure to conform in any circumstance,' he says. 'It's about being able to question conventional wisdom,' he asserts. 'I believe in love, but not monogamy,' he says plainly.

And this isn't a made up troll bullshit either! He actually stated this tripe, which makes it obvious that he is trying to politely say that he's a flaming homo [comp-u-geek.net] slut [rotten.com] !

Speaking about 'flaming,' who better to point out as a filthy chutney ferret than Slashdot's very own self-confessed pederast Jon Katz. Although an obvious deviant anagram cannot be found from his name, he has already confessed, nay boasted of the homosexual [goatse.fr] perversion of corrupting the innocence of young children [slashdot.org] . To quote from the article linked:

'I've got a rare kidney disease,' I told her. 'I have to go to the bathroom a lot. You can come with me if you want, but it takes a while. Is that okay with you? Do you want a note from my doctor?'

Is this why you were touching your penis [rotten.com] in the cinema, Jon? And letting the other boys touch it too?

We should also point out that Jon Katz refers to himself as 'Slashdot's resident Gasbag.' Is there any more doubt? For those fortunate few who aren't aware of the list of homosexual [goatse.fr] terminology found inside the Linux 'Sauce Code,' a 'Gasbag' is a pervert who gains sexual gratification from having a thin straw inserted into his urethra (or to use the common parlance, 'piss-pipe'), then his homosexual [goatse.fr] lover blows firmly down the straw to inflate his scrotum. This is, of course, when he's not busy violating the dignity and copyright of posters to Slashdot by gathering together their postings and publishing them en masse to further his twisted and manipulative journalistic agenda.

Sick, disgusting antichristian perverts, the lot of them.

In addition, many of the Linux distributions (a 'distribution' is the most common way to spread the faggots' wares) are run by faggot groups. The Slackware [redhat.com] distro is named after the 'Slack-wear' fags wear to allow easy access to the anus for sexual purposes. Furthermore, Slackware is a close anagram of claw arse, a reference to the homosexual [goatse.fr] practise of anal fisting. The Mandrake [slackware.com] product is run by a group of French faggot satanists, and is named after the faggot nickname for the vibrator. It was also chosen because it is an anagram for dark amen and ram naked, which is what they do.

Another 'distro,' (abbrieviated as such because it sounds a bit like 'Disco,' which is where homosexuals [goatse.fr] preyed on young boys in the 1970s), is Debian, [mandrake.com] an anagram of in a bed, which could be considered innocent enough (after all, a bed is both where we sleep and pray), until we realise what other names Debian uses to describe their foul wares. 'Woody' is obvious enough, being a term for the erect male penis [rotten.com] , glistening with pre-cum. But far sicker is the phrase 'Frozen Potato' that they use. This filthy term, again found in the secret homosexual [goatse.fr] 'Sauce Code,' refers to the solo homosexual [goatse.fr] practice of defecating into a clear polythene bag, shaping the turd into a crude approximation of the male phallus, then leaving it in the freezer overnight until it becomes solid. The practitioner then proceeds to push the frozen 'potato' up his own rectum, squeezing it in and out until his tight young balls erupt in a screaming orgasm.

And Red Hat [debian.org] is secret homo [comp-u-geek.net] slang for the tip of a penis [rotten.com] that is soaked in blood from a freshly violated underage ringpiece.

The fags have even invented special tools to aid their faggotry! For example, the 'supermount' tool was devised to allow deeper penetration, which is good for fags because it gives more pressure on the prostate gland. 'Automount' is used, on the other hand, because Linux users are all fat and gay, and need to mount each other [comp-u-geek.net] automatically.

The depths of their depravity can be seen in their use of 'mount points.' These are, plainly speaking, the different points of penetration. The main one is obviously/anus, but there are others. Militant fags even say 'there is no/opt mount point' because for these dirty perverts faggotry is not optional but a way of life.

More evidence is in the fact that Linux users say how much they love `man`, even going so far as to say that all new Linux users (who are in fact just innocent heterosexuals indoctrinated by the gay propaganda) should try out `man`. In no other system do users boast of their frequent recourse to a man.

Other areas of the system also show Linux's inherent gayness. For example, people are often told of the 'FAQ,' but how many innocent heterosexual Windows [amiga.com] users know what this actually means. The answer is shocking: Faggot Anal Quest: the voyage of discovery for newly converted fags!

Even the title 'Slashdot [geekizoid.com] ' originally referred to a homosexual [goatse.fr] practice. Slashdot [kuro5hin.org] of course refers to the popular gay practice of blood-letting. The Slashbots, of course are those super-zealous homosexuals [goatse.fr] who take this perversion to its extreme by ripping open their anuses, as seen on the site most popular with Slashdot users, the depraved work of Satan, http://www.eff.org/ [eff.org] .

The editors of Slashdot [slashduh.org] also have homosexual [goatse.fr] names: 'Hemos' is obvious in itself, being one vowel away from 'Homos.' But even more sickening is 'Commander Taco' which sounds a bit like 'Commode in Taco,' filthy gay slang for a pair of spreadeagled buttocks that are caked with excrement [pboy.com] . (The best form of lubrication, they insist.) Sometimes, these 'Taco Commodes' have special 'Salsa Sauce' (blood from a ruptured rectum) and 'Cheese' (rancid flakes of penis [rotten.com] discharge) toppings. And to make it even worse, Slashdot [notslashdot.org] runs on Apache!

The Apache [microsoft.com] server, whose use among fags is as prevalent as AIDS, is named after homosexual [goatse.fr] activity -- as everyone knows, popular faggot band, the Village People, featured an Apache Indian, and it is for him that this gay program is named.

And that's not forgetting the use of patches in the Linux fag world -- patches are used to make the anus accessible for repeated anal sex even after its rupture by a session of fisting.

To summarise: Linux is gay. 'Slash -- Dot' is the graphical description of the space between a young boy's scrotum and anus. And BeOS [apple.com] is for hermaphrodites and disabled 'stumpers.'

FEEDBACK

What worries me is how much you know about what gay people do. I'm scared I actually read this whole thing. I think this post is a good example of the negative effects of Internet usage on people. This person obviously has no social life anymore and had to result to writing something as stupid as this. And actually take the time to do it too. Although... I think it was satire.. blah.. it's early. -- Anonymous Coward, Slashdot

Well, the only reason I know all about this is because I had the misfortune to read the Linux 'Sauce code' once. Although publicised as the computer code needed to get Linux up and running on a computer (and haven't you always been worried about the phrase 'Monolithic Kernel'?), this foul document is actually a detailed and graphic description of every conceivable degrading perversion known to the human race, as well as a few of the major animal species. It has shocked and disturbed me, to the point of needing to shock and disturb the common man to warn them of the impending homo [comp-u-geek.net] -calypse which threatens to engulf our planet.

You must work for the government. Trying to post the most obscene stuff in hopes that slashdot won't be able to continue or something, due to legal woes. If i ever see your ugly face, i'm going to stick my fireplace poker up your ass, after it's nice and hot, to weld shut that nasty gaping hole of yours. -- Anonymous Coward, Slashdot

Doesn't it give you a hard-on to imagine your thick strong poker ramming it's way up my most sacred of sphincters? You're beyond help, my friend, as the only thing you can imagine is the foul penetrative violation of another man. Are you sure you're not Eric Raymond? The government, being populated by limp-wristed liberals, could never stem the sickening tide of homosexual [goatse.fr] child molesting Linux advocacy. Hell, they've given NAMBLA free reign for years!

you really should post this logged in. i wish i could remember jebus's password, cuz i'd give it to you. -- mighty jebus [slashdot.org] , Slashdot

Thank you for your kind words of support. However, this document shall only ever be posted anonymously. This is because the 'Open Sauce' movement is a sham, proposing homoerotic cults of hero worshipping in the name of freedom. I speak for the common man. For any man who prefers the warm, enveloping velvet folds of a woman's vagina [bodysnatchers.co.uk] to the tight puckered ringpiece of a child. These men, being common, decent folk, don't have a say in the political hypocrisy that is Slashdot culture. I am the unknown liberator [hitler.org] .

ROLF LAMO i hate linux FAGGOTS -- Anonymous Coward, Slashdot

We shouldn't hate them, we should pity them for the misguided fools they are... Fanatical Linux zeal-outs need to be herded into camps for re-education and subsequent rehabilitation into normal heterosexual society. This re-education shall be achieved by forcing them to watch repeats of Baywatch until the very mention of Pamela Anderson [rotten.com] causes them to fill their pants with healthy heterosexual jism [zillabunny.com] .

Actually, that's not at all how scrotal inflation works. I understand it involves injecting sterile saline solution into the scrotum. I've never tried this, but you can read how to do it safely in case you're interested. (Before you moderate this down, ask yourself honestly -- who are the real crazies -- people who do scrotal inflation, or people who pay $1000+ for a game console?) -- double_h [slashdot.org] , Slashdot

Well, it just goes to show that even the holy Linux 'sauce code' is riddled with bugs that need fixing. (The irony of Jon Katz not even being able to inflate his scrotum correctly has not been lost on me.) The Linux pervert elite already acknowledge this, with their queer slogan: 'Given enough arms, all rectums are shallow.' And anyway, the PS2 [xbox.com] sucks major cock and isn't worth the money. Intellivision forever!

dude did u used to post on msnbc's nt bulletin board now that u are doing anti-gay posts u also need to start in with anti-black stuff too c u in church -- Anonymous Coward, Slashdot

For one thing, whilst Linux is a cavalcade of queer propaganda masquerading as the future of computing, NT [linux.com] is used by people who think nothing better of encasing their genitals in quick setting plaster then going to see a really dirty porno film, enjoying the restriction enforced onto them. Remember, a wasted arousal is a sin in the eyes of the Catholic church [atheism.org] . Clearly, the only god-fearing Christian operating system in existence is CP/M -- The Christian Program Monitor. All computer users should immediately ask their local pastor to install this fine OS onto their systems. It is the only route to salvation.

Secondly, this message is for every man. Computers know no colour. Not only that, but one of the finest websites in the world is maintained by a Black Man [stileproject.com] . Now fuck off you racist donkey felcher.

And don't forget that slashdot was written in Perl, which is just too close to 'Pearl Necklace' for comfort.... oh wait; that's something all you heterosexuals do.... I can't help but wonder how much faster the trolls could do First-Posts on this site if it were redone in PHP... I could hand-type dynamic HTML pages faster than Perl can do them. -- phee [slashdot.org] , Slashdot

Although there is nothing unholy about the fine heterosexual act of ejaculating between a woman's breasts, squirting one's load up towards her neck and chin area, it should be noted that Perl [python.org] (standing for Pansies Entering Rectums Locally) is also close to 'Pearl Monocle,' 'Pearl Nosering,' and the ubiquitous 'Pearl Enema.'

One scary thing about Perl [sun.com] is that it contains hidden homosexual [goatse.fr] messages. Take the following code: LWP::Simple -- It looks innocuous enough, doesn't it? But look at the line closely: There are two colons next to each other! As Larry 'Balls to the' Wall would openly admit in the Perl Documentation, Perl was designed from the ground up to indoctrinate it's programmers into performing unnatural sexual acts -- having two colons so closely together is clearly a reference to the perverse sickening act of 'colon kissing,' whereby two homosexual [goatse.fr] queers spread their buttocks wide, pressing their filthy torn sphincters together. They then share small round objects like marbles or golfballs by passing them from one rectum to another using muscle contraction alone. This is also referred to in programming 'circles' as 'Parameter Passing.'

And PHP [perl.org] stands for Perverted Homosexual Penetration. Didn't you know?

Thank you for your valuable input on this. I am sure you will be never forgotten. BTW: Did I mention that this could be useful in terraforming Mars? Mars rulaa. -- Eimernase [slashdot.org] , Slashdot

Well, I don't know about terraforming Mars, but I do know that homosexual [goatse.fr] Linux Advocates have been probing Uranus for years.

That's inspiring. Keep up the good work, AC. May God in his wisdom grant you the strength to bring the plain honest truth to this community, and make it pure again. Yours, Cerberus. -- Anonymous Coward, Slashdot

*sniff* That brings a tear to my eye. Thank you once more for your kind support. I have taken faith in the knowledge that I am doing the Good Lord [atheism.org] 's work, but it is encouraging to know that I am helping out the common man here.

However, I should be cautious about revealing your name 'Cerberus' on such a filthy den of depravity as Slashdot. It is a well known fact that the 'Kerberos' documentation from Microsoft is a detailed manual describing, in intimate, exacting detail, how to sexually penetrate a variety of unwilling canine animals; be they domesticated, wild, or mythical. Slashdot posters have taken great pleasure in illegally spreading this documentation far and wide, treating it as an 'extension' to the Linux 'Sauce Code,' for the sake of 'interoperability.' (The slang term they use for nonconsensual intercourse -- their favourite kind.)

In fact, sick twisted Linux deviants are known to have LAN parties, (Love of Anal Naughtiness, needless to say.), wherein they entice a stray dog, known as the 'Samba Mount,' into their homes. Up to four of these filth-sodden blasphemers against nature take turns to plunge their erect, throbbing, uncircumcised members, conkers-deep, into the rectum, mouth, and other fleshy orifices of the poor animal. Eventually, the 'Samba Mount' collapses due to 'overload,' and needs to be 'rebooted.' (i.e., kicked out into the street, and left to fend for itself.) Many Linux users boast about their 'uptime' in such situations.

Inspiring stuff! If only all trolls were this quality! -- Anonymous Coward, Slashdot

If only indeed. You can help our brave cause by moderating this message up as often as possible. I recommend '+1, Underrated,' as that will protect your precious Karma in Metamoderation [slashdot.org] . Only then can we break through the glass ceiling of Homosexual Slashdot Culture. Is it any wonder that the new version of Slashcode has been christened 'Bender'???

If we can get just one of these postings up to at least '+1,' then it will be archived forever! Others will learn of our struggle, and join with us in our battle for freedom!

It's pathetic you've spent so much time writing this. -- Anonymous Coward, Slashdot

I am compelled to document the foulness and carnal depravity [catholic.net] that is Linux, in order that we may prepare ourselves for the great holy war that is to follow. It is my solemn duty to peel back the foreskin of ignorance and apply the wire brush of enlightenment.

As with any great open-source project, you need someone asking this question, so I'll do it. When the hell is version 2.0 going to be ready?!?! -- Anonymous Coward, Slashdot

I could make an arrogant, childish comment along the lines of 'Every time someone asks for 2.0, I won't release it for another 24 hours,' but the truth of the matter is that I'm quite nervous of releasing a 'number two,' as I can guarantee some filthy shit-slurping Linux pervert would want to suck it straight out of my anus before I've even had chance to wipe.

I desperately want to suck your monolithic kernel, you sexy hunk, you. -- Anonymous Coward, Slashdot

I sincerely hope you're Natalie Portman [archive.org] .

Dude, nothing on slashdot larger than 3 paragraphs is worth reading. Try to distill the message, whatever it was, and maybe I'll read it. As it is, I have to much open source software to write to waste even 10 seconds of precious time. 10 seconds is all its gonna take M$ to whoop Linux's ass. Vigilence is the price of Free (as in libre -- from the fine, frou frou French language) Software. Hack on fellow geeks, and remember: Friday is Bouillabaisse day except for heathens who do not believe that Jesus died for their sins. Those godless, oil drench, bearded sexist clowns can pull grits from their pantaloons (another fine, fine French word) and eat that. Anyway, try to keep your message focused and concise. For concision is the soul of derision. Way. -- Anonymous Coward, Slashdot

What the fuck?

I've read your gay conspiracy post version 1.3.0 and I must say I'm impressed. In particular, I appreciate how you have managed to squeeze in a healthy dose of the latent homosexuality you gay-bashing homos [comp-u-geek.net] tend to be full of. Thank you again. -- Anonymous Coward, Slashdot

Well bugger me!

ooooh honey. how insecure are you!!! wann a little massage from deare bruci. love you -- Anonymous Coward, Slashdot

Fuck right off!

IMPORTANT: This message needs to be heard (Not HURD [linux.org] , which is an acronym for 'Huge Unclean Rectal Dilator') across the whole community, so it has been released into the Public Domain [icopyright.com] . You know, that licence that we all had before those homoerotic crypto-fascists came out with the GPL [apple.com] (Gay Penetration License) that is no more than an excuse to see who's got the biggest feces-encrusted [rotten.com] cock. I would have put this up on Freshmeat [adultmember.com] , but that name is known to be a euphemism for the tight rump of a young boy.

Come to think of it, the whole concept of 'Source Control' unnerves me, because it sounds a bit like 'Sauce Control,' which is a description of the homosexual [goatse.fr] practice of holding the base of the cock shaft tightly upon the point of ejaculation, thus causing a build up of semenal fluid that is only released upon entry into an incision made into the base of the receiver's scrotum. And 'Open Sauce' is the act of ejaculating into another mans face or perhaps a biscuit to be shared later. Obviously, 'Closed Sauce' is the only Christian thing to do, as evidenced by the fact that it is what Cathedrals are all about.

Contributors: (although not to the eternal game of 'soggy biscuit' that open 'sauce' development has become) Anonymous Coward, Anonymous Coward, phee, Anonymous Coward, mighty jebus, Anonymous Coward, Anonymous Coward, double_h, Anonymous Coward, Eimernase, Anonymous Coward, Anonymous Coward, Anonymous Coward, Anonymous Coward, Anonymous Coward, Anonymous Coward, Anonymous Coward, Anonymous Coward. Further contributions are welcome.

Current changes: This version sent to FreeWIPO [slashdot.org] by 'Bring BackATV' as plain text. Reformatted everything, added all links back in (that we could match from the previous version), many new ones (Slashbot bait links). Even more spelling fixed. Who wrote this thing, CmdrTaco himself?

Previous changes: Yet more changes added. Spelling fixed. Feedback added. Explanation of 'distro' system. 'Mount Point' syntax described. More filth regarding `man` and Slashdot. Yet more fucking spelling fixed. 'Fetchmail' uncovered further. More Slashbot baiting. Apache exposed. Distribution licence at foot of document.

ANUX -- A full Linux distribution... Up your ass!

LOL - captcha "glorying"

Re:Ballsy (2, Insightful)

Anonymous Coward | more than 4 years ago | (#31265844)

both wikileaks and cryptome should periodically make torrents of all their contents and release them to the world. That is a good idea.

Re:Ballsy (0)

Anonymous Coward | more than 4 years ago | (#31266230)

Hmm, i never knew Microsoft had so little data to offer. I expect the same document from Google to be more of an eye-opener...
I still don't get all the fuzz about which data they keep track of for operational purposes. It's the data they keep track of for "marketing" purposes.

Mirror of the offending document? (2, Interesting)

base3 (539820) | more than 4 years ago | (#31265728)

MD5? Magnet link? Not that I would seek it out or anything.

Re:Mirror of the offending document? (2, Informative)

ak_hepcat (468765) | more than 4 years ago | (#31265782)

"http://file.wikileaks.org/files/" + "microsoft-spy.pdf"

Just, you know, in case?

Re:Mirror of the offending document? (0)

Anonymous Coward | more than 4 years ago | (#31265796)

http://file.wikileaks.org/files/microsoft-spy.pdf

Re:Mirror of the offending document? (2, Informative)

klingens (147173) | more than 4 years ago | (#31265808)

The mirror-site cryptome put up is http://cryptomeorg.siteprotect.net/ [siteprotect.net]
However, they took the offending document down and wrote "for the MS Spy Guide send email to ..."

Re:Mirror of the offending document? (1)

base3 (539820) | more than 4 years ago | (#31265834)

Thanks!

Re:Mirror of the offending document? (0)

Anonymous Coward | more than 4 years ago | (#31266428)

Rock, you surely do.

Re:Mirror of the offending document? (1, Informative)

Anonymous Coward | more than 4 years ago | (#31266068)

MD5: f688c4406d3a3fb76f72248630fea270

I don't understand why it's supposedly confidential - there's nothing sensitive in it whatsoever, it seems to match up perfectly with their privacy policies, and even confirms that (for example) they do not log the content of Messenger conversations.

I am amazed that after all this time, all those secret and quasi-secret documents published, cryptome was finally destroyed by this, however. What Wikileaks does today was to a large extent pioneered by John Young. But it appears copyright has finally trumped free speech in the US - the astute will note that in fact, Netsol's response is, though pigheaded, in perfect compliance with the DMCA 512(g)(2) counter-notification proposal (in the actual DMCA as enacted in the US, counter-notifications cannot take effect immediately, it must stay down for 10 days!).

I hope John Young's creation comes back, hopefully unstoppable, but it is a crushing blow for a long-standing privacy and free speech campaigner that he may have to move the servers out-of-jurisdiction to actually exercise that free speech.

Re:Mirror of the offending document? (1)

e9th (652576) | more than 4 years ago | (#31266430)

Just wait until the US adopts the ACTA.

Re:Mirror of the offending document? (0)

Anonymous Coward | more than 4 years ago | (#31266532)

I don't understand why it's supposedly confidential - there's nothing sensitive in it whatsoever, it seems to match up perfectly with their privacy policies, and even confirms that (for example) they do not log the content of Messenger conversations.

Well, that's flat-out wrong. They DO log the content of messenger conversations, and that has been proven in court.

There was a murder case in Toronto, Canada where a teenage girl persuaded her boyfriend to kill another girl. Much of the evidence was MSN chat:

http://network.nationalpost.com/np/blogs/toronto/archive/2009/03/09/murder-accused-s-online-chat-records-show-desire-to-kill-rengel-trial.aspx [nationalpost.com]

Re:Mirror of the offending document? (1)

bmetzler (12546) | more than 4 years ago | (#31266738)

There is no evidence in the story that suggests that Microsoft logs messenger conversions. For all you know the chat logs most likely came from the PC's of the persons involved in the case.

Wikileaks mirror (4, Informative)

TheSHAD0W (258774) | more than 4 years ago | (#31265794)

Wikileaks [wikileaks.org] may not be mirroring Cryptome.org in its entirety yet, but they are hosting the "offending" material [wikileaks.org] . Download and redistribute!

Re:Wikileaks mirror (1, Informative)

Anonymous Coward | more than 4 years ago | (#31265932)

i read this material... what is so offensive about it?

Re:Wikileaks mirror (2, Informative)

TheSHAD0W (258774) | more than 4 years ago | (#31265986)

Why do you think I put the word in quotes? :-P

Re:Wikileaks mirror (2, Informative)

Darkness404 (1287218) | more than 4 years ago | (#31266192)

Because it shows that "law" enforcement officers are basically able to use whatever records they want from Microsoft, not only via a textdump from a server somewhere, but with a nice GUI and little concern of user's privacy. Myself, I'd want to use an e-mail provider that first off didn't keep logs, but if they did, they wouldn't provide a nice GUI for "law" enforcement and that they would make it quite hard for them to reduce privacy. This document shows Microsoft is exactly the opposite.

Re:Wikileaks mirror (0)

Anonymous Coward | more than 4 years ago | (#31266616)

You might note the last page of the document where it mentions: "Legal Process Required for Customer Account Information and Content".

This page delineates what information may be obtained with a subpoena, what information requires a court order to obtain, and what information a search warrant is required to obtain access to.

So your mention of "little concern of user's privacy" is pretty much negated by Microsoft's compliance with the law. Not that they couldn't ignore the Electronic Communications Privacy Act, but then they'd have legal exposure.

Coral Cache Mirror (0)

Anonymous Coward | more than 4 years ago | (#31266406)

Because we shouldn't be dicks and slashdot wikileaks. How about a free CDN alternative folks? :)

http://file.wikileaks.org.nyud.net/files/microsoft-spy.pdf

Oooo BABY BA-BE, BABY BA-BE ))ooo BABY BA-BE (-1, Redundant)

Anonymous Coward | more than 4 years ago | (#31266614)

Ba-ba-baby Ooooo PUSH IT Push it REAL GOOD !!

Eat Yellow Snnow Ballmer !!

Mirror and Donation Link Here (4, Informative)

chill (34294) | more than 4 years ago | (#31265800)

http://cryptomeorg.siteprotect.net/ [siteprotect.net]

$25 will get you 2 DVDs with 54,000+ articles, spanning June 1996 to February 2010, mailed anywhere in the world.

Re:Mirror and Donation Link Here (1)

nurb432 (527695) | more than 4 years ago | (#31266334)

And get put on a watched list...

The smaller they are the easier they fall (5, Insightful)

Adrian Lopez (2615) | more than 4 years ago | (#31265850)

I wonder what this says about the degree of power different entities have when they choose to resist DMCA requests. Would Google's upstream provider(s) ever dare to take Google offline should Google decide not to comply with a particular DMCA request like Cryptome's provider has done? I suspect not. There must be an advantage to being a big player on the Internet, and a clear disadvantage under the DMCA to being as small as Cryptome. It's easier to be bullied when you're Cryptome, which somehow makes the DMCA seem even worse than I once thought it was.

Re:The smaller they are the easier they fall (1)

Darkness404 (1287218) | more than 4 years ago | (#31265890)

The smaller they are the easier they fall

Of course. The same thing is true for every legally dubious act. Look at how many businesses will settle out of court, look at how many people choose to settle out of court against the RIAA who uses questionable tactics.

Re:The smaller they are the easier they fall (1)

Attila Dimedici (1036002) | more than 4 years ago | (#31266552)

The same thing is true for any law. The more wealth/power you have, the less negative impact that the law will have on you.

Re:The smaller they are the easier they fall (1, Insightful)

Anonymous Coward | more than 4 years ago | (#31266012)

I wonder what this says about the degree of power different entities have when they choose to resist DMCA requests. Would Google's upstream provider(s) ever dare to take Google offline should Google decide not to comply with a particular DMCA request like Cryptome's provider has done?

You're misunderstanding what this part of the DMCA actually does. It allows someone whose copyright was infringed to ask the ISP to identify the infringer, so that you can pursue the infringer in court.

If the ISP complies with the DMCA process (which also allows the ISP to put the material back up once the alleged infringer has been identified), then the ISP is guaranteed to have no liability. There is no general requirement to take down the material.

If the ISP doesn't comply with the DMCA process, then the ISP *might* have liability, but even then probably doesn't (IANAL).

Re:The smaller they are the easier they fall (0)

Anonymous Coward | more than 4 years ago | (#31266122)

Does google even have an upstream provider? Aren't they directly connected on multiple BGP routers and owning their own Fiber? I don't think blocking google would be a trivial matter.

Re:The smaller they are the easier they fall (1)

slimjim8094 (941042) | more than 4 years ago | (#31266350)

Does Google even *have* upstream providers any more? I guess so... but none that'd be stupid enough to cut them off.

What Google should do is light up enough of that dark fiber to *own* it's datacenter-to-datacenter links. Then they could easily become their own Tier-1 provider.

Confirmed. (3, Funny)

headkase (533448) | more than 4 years ago | (#31265866)

Whatever is in that document, thank you Microsoft for 100% confirming it is what you said. Now, http has heads. You *can* cut them off. Where there is a disconnect between morality and law however is called corruption and that needs to be measured in each case: anyone care to measure here? So, you can cut off all the http heads. What good will that do you? You think Cryptome doesn't have contacts? Doesn't have people who are in the know and know what they are looking for? Microsoft just gave them some free advertising that they have it. Everyone who wants it already does have it by now. And in a shortish while after some corrupt wrangling the http head will come back up and start serving again until the next grand advertisement occurs. But always, occuring in parallel to all this are the things without heads: it will take a great deal more corruption in law to silence those.

Re:Confirmed. (1)

Monkeedude1212 (1560403) | more than 4 years ago | (#31265930)

The H in HTTP is actual Hydra.

Re:Confirmed. (1)

headkase (533448) | more than 4 years ago | (#31265980)

But it's called FTP ;)

Did Young file a counter-notice? (1)

John Hasler (414242) | more than 4 years ago | (#31265920)

n/t

Re:Did Young file a counter-notice? (0)

Anonymous Coward | more than 4 years ago | (#31266440)

Yes. [siteprotect.net]

Network Solutions as Judge, Jury, and Executioner (2, Insightful)

BlueBoxSW.com (745855) | more than 4 years ago | (#31265940)

Anyone else a little wary of Network Solutions acting as a judge, jury, and executioner?

Is this their role? Should this be their role?

What information do they release regarding their processes and decisions?

Do you trust a corporate entity with such a track record of being difficult to deal with, to interpret the law?

Re:Network Solutions as Judge, Jury, and Execution (1)

maxume (22995) | more than 4 years ago | (#31266024)

Well, if you know about the DMCA, then you know that your hosting provider is going to be interpreting the law (roughly, they are going to be complying with DMCA takedown notices).

So it isn't a wild idea to presume that someone paying Network Solutions trusts them to interpret the law.

Re:Network Solutions as Judge, Jury, and Execution (0)

Lehk228 (705449) | more than 4 years ago | (#31266258)

if he didn't counter-notice, then network solutions did exactly what they had to do under the DMCA

Re:Network Solutions as Judge, Jury, and Execution (4, Interesting)

erroneus (253617) | more than 4 years ago | (#31266608)

If you read the article, you would know that they did file a counter-notice.

Network Solutions not only took their site down, but locked the domain to prevent it from coming up somewhere else. This is an extremely aggressive move and one I suspect violates their own terms and conditions and may be actionable under the law.

Re:Network Solutions as Judge, Jury, and Execution (5, Insightful)

urulokion (597607) | more than 4 years ago | (#31266302)

Its appalling, and an abuse of the DCMA takedown notices in every aspect. The takedown procedures are in place to provide a legal safe harbor for the company hosting the content.. The takedown notice is to allow the contested content to be removed to minimize any damage. The takedown period in which the the content is removed it allow time for the copyright to get to court to get a temporary restraining order to keep the content offline. The Counter-Notice allows the person who put up the content to get it back online if they believe they are in the right.

Network Solutions is NOT the hosting company. It's merely a DNS registrar. NetSol has no legal liability what soever. They went WAY beyond what is legally required. The DCMA required only the contested content be removed in any case. Network Solutions removing access to entire web site is very troubling. And it may even have opened them up to a lawsuit themselves.

Re:Network Solutions as Judge, Jury, and Execution (2, Informative)

Wesley Felter (138342) | more than 4 years ago | (#31266450)

Maybe you haven't looked at their site lately (I wouldn't blame you); NetSol has been providing hosting for years: http://www.networksolutions.com/web-hosting/index.jsp [networksolutions.com]

Re:Network Solutions as Judge, Jury, and Execution (0)

Anonymous Coward | more than 4 years ago | (#31266588)

Agreed. I am just surprised there's anyone left doing business with Notwork Solutions. You get what you pay for.

Let it be another continuing lesson to avoid using them for anything.

Wikileaks (4, Funny)

Arancaytar (966377) | more than 4 years ago | (#31265942)

In a gesture of goodwill Wikileaks has offered to host Cryptome via their twitter feed.

That's nice of them, but honestly I'd like it if they started hosting their own site again, too.

Re:Wikileaks (0)

Darkness404 (1287218) | more than 4 years ago | (#31266026)

Mod parent up.

Seriously, its like they should make a LiveJournal or something to whine about it. Yeah, -some- of Wikileak's patrons may be reporters who have spare cash to donate, but the rest of us are simply citizens who want to make informed decisions rather than rely on third-party sources. Yeah, I've donated, no I can't donate the $500 they think that all of their readers are obligated to donate.

Hosting via Twitter (5, Funny)

dangitman (862676) | more than 4 years ago | (#31265950)

Wikileaks has offered to host Cryptome via their twitter feed.

This Twitter stuff is getting out of control. First it starts as 140 character messages, now they're hosting entire websites with it.

Re:Hosting via Twitter (2, Funny)

copponex (13876) | more than 4 years ago | (#31266194)

Yeah. Twitpache and TwitQuery are bloated already. I'm using Twithttpd with Twython.

Re:Hosting via Twitter (1)

Chelloveck (14643) | more than 4 years ago | (#31266222)

This Twitter stuff is getting out of control. First it starts as 140 character messages, now they're hosting entire websites with it.

Yes, but each HTTP request or response has to be no more than 140 characters. That means that the HTTP response pretty much consists of 139 characters of header and a single character of content. It takes a looooonnnnggg time to download...

Twitter hosting (4, Funny)

Homburg (213427) | more than 4 years ago | (#31265952)

Wikileaks has offered to host Cryptome via their twitter feed.

Hosting 140 characters at a time?

Move on...nothing to see here... (2, Informative)

LDAPMAN (930041) | more than 4 years ago | (#31266006)

Having just skimmed the doc, I don't see why anyone would care. The information available to law enforcement is actually less than I had expected.

Re:Move on...nothing to see here... (1)

Dunbal (464142) | more than 4 years ago | (#31266036)

I agree - I just read it and it seems that Microsoft is stating what it retains, and what process (subpoena, court order, search warrant) is required to access which information.

I think the REAL issue is the fact that the Cryptome site was shut down over this because DMCA was mentioned even though this has absolutely nothing to do with the DMCA.

Re:Move on...nothing to see here... (1, Insightful)

Anonymous Coward | more than 4 years ago | (#31266154)

Yep. This thing only has legs because Microsoft are being a dick about it. Otherwise nobody would care.

Re:Move on...nothing to see here... (3, Interesting)

Anonymous Coward | more than 4 years ago | (#31266160)

Having just skimmed the doc, I don't see why anyone would care. The information available to law enforcement is actually less than I had expected.

Actually, I suspect that Microsoft are flat-out lying. There was a murder case in Toronto, Canada where a teenage girl persuaded her boyfriend to murder another girl:

http://www.cbc.ca/canada/toronto/story/2009/03/13/rengel-trial.html [www.cbc.ca]
http://www.thestar.com/article/596268 [thestar.com]

Much of the evidence was in MSN chat logs between the girl and her boyfriend. This Microsoft document claims on page 13 that "Microsoft does not log the content of communications between users".

So if it isn't logged, where did all this evidence come from?

Re:Move on...nothing to see here... (4, Informative)

Predius (560344) | more than 4 years ago | (#31266292)

Local logs on their machines? MSN may not log at the main server, but many clients certainly log locally.

But it *is* copyrighted, right? (5, Insightful)

SOdhner (1619761) | more than 4 years ago | (#31266058)

I just want to make sure I fully understand the situation. This is something written by MS and being hosted in its entirety by someone else without permission, right? So their claim is legally correct and everything, isn't it? I'm not saying I like Microsoft but I just want to be clear on the details which seem to imply that whether or not this is a *nice* thing to do it at least fits the standards for a DMCA notice. Please correct me if I've misunderstood.

Re:But it *is* copyrighted, right? (4, Informative)

TubeSteak (669689) | more than 4 years ago | (#31266242)

I just want to make sure I fully understand the situation. This is something written by MS and being hosted in its entirety by someone else without permission, right? So their claim is legally correct and everything, isn't it?

Written by MS: Yes
Hosted by someone else w/o permission: Yes
Legally correct claim: ???

The newsworthiness of the document makes for a very strong defense against any copyright claim and that's the rebuttal Cryptome made in the DMCA reply.

Re:But it *is* copyrighted, right? (1)

_bug_ (112702) | more than 4 years ago | (#31266278)

So their claim is legally correct and everything, isn't it?

IANAL, but an argument for fair use [copyright.gov] could be made. You could argue Cryptome's publication of the document is news worthy and being used for the purpose of criticism and comment.

Re:But it *is* copyrighted, right? (-1, Troll)

RightSaidFred99 (874576) | more than 4 years ago | (#31266280)

You don't misunderstand, you're completely right. Some scumbag is posting copyrighted material and thinks he's righteous. It's no different than if a screener gets a copy of a movie before release and posts it online, or if someone steals the design documents for a chip from a semiconductor company and posts it on his blog. It's a copyrighted document, Microsoft owns the copyright, and this little douche has no legal right to distribute it.

The fact that it's Microsoft and that the document is of little importance has no real bearing on the issue. I hope they squash this little worm.

Re:But it *is* copyrighted, right? (0)

Anonymous Coward | more than 4 years ago | (#31266474)

I know this is Slashdot and all, but you really need to RTFA.

Re:But it *is* copyrighted, right? (0, Troll)

RightSaidFred99 (874576) | more than 4 years ago | (#31266526)

I did read it. The document is copyrighted, the guy has no right to publish it period. His legal sounding blatherings, if you read them, do not address this simple fact.

You neckbeards can wax righteous about the evils of copyright and mod me down all you want, and I do agree Copyright law been perverted from its original purpose but in this case the guy is publishing something he has no right to publish. He's going to get squished.

Re:But it *is* copyrighted, right? (1)

jweese (1746032) | more than 4 years ago | (#31266760)

This really doesn't have much to do about copyright being fair. He should be claiming that the document is newsworthy, which would allow him to have it posted even under the DMCA. IANAL

Re:But it *is* copyrighted, right? (-1, Flamebait)

Anonymous Coward | more than 4 years ago | (#31266284)

I'll clear this up for you:

- If the issue involves the GPL or free software, then copyright is good and must be obeyed.

- If the issue involves MS, the RIAA, the MPAA, or the DMCA in any way then copyright is horrible and should be abolished.

Re:But it *is* copyrighted, right? (0)

Anonymous Coward | more than 4 years ago | (#31266566)

Depends on your view of the third leg of democracy: news publishing. Cryptome's view in this case that copyright does not apply to keeping secrets; they're being whistle-blowers.

I don't know if copyright has been presented to court before to protect an entire secret document. This would be a good time for some of our /. lawyers and law students to point out precedence for us.

Re:But it *is* copyrighted, right? (1)

plover (150551) | more than 4 years ago | (#31266704)

Google for the Clams and OT III. Same thing happened to samizdat.
 

Is this the same Wikileaks... (2, Insightful)

Improv (2467) | more than 4 years ago | (#31266088)

That appears to be nearly dead for lack of funding? Generosity is good, but probably not on one's deathbed.

wikileaks.org down (0)

Anonymous Coward | more than 4 years ago | (#31266158)

It appears that www.wikileaks.org and wikileaks.org are down (connection reset by peer), tried from multiple locations.

summary of document (2, Insightful)

Anonymous Coward | more than 4 years ago | (#31266200)

Document is a 22 page pdf, about 1.7 MB, size is partly due to a few semi-useful diagrams from some PHB's powerpoint presentation. It's not anything super technical.

sha1 checksum is 15d4c4c7ea3aa93e128bb5756deb72f4e22926f3.

A quick glance didn't reveal anything terribly surprising in the document. It discusses things like how long they retain stuff like user IP addresses for hotmail (answer: 60 days). Also there is a special phone number for emergency requests like those dealing with murder threats. Regular old subpoenas are supposed to go through a non-emergency process.

Except for a few things like internal Microsoft phone numbers, I didn't see anything in the document that had much reason to be confidential. Stuff like the 60 day retention policy really belong in the published privacy statement (I don't know if it's already there).

Didn't think this is how the DMCA works (2, Interesting)

internic (453511) | more than 4 years ago | (#31266216)

I'm confused...I thought the way the DMCA safe harbor provisions work is that in order to be immune, the provider must take down the content when a DMCA notice is received, but if the customer files a counter-notice then they can put it back up and they're off the hook (at least until they get a court order). So why are they taking it down in this case?

Re:Didn't think this is how the DMCA works (4, Informative)

2short (466733) | more than 4 years ago | (#31266666)


The provider must take down the content within a certain time of receiving a notice. After they receive a counter-notice, the content stays down for 10-14 days, during which the original notifier must file a lawsuit. If they don't, the content goes back up.

Before taking anything down Network Solutions suggested that Cryptome file a counter notice, and pointed out to them how to do it. They pointed out that if Cryptome took down the one file for the 10-14 days, they would not have to take down the rest of the site. Cryptome sent a counter notice which specifically indicated they would not be taking down the file. Upon receipt, Network Solutions took down the site, as they clearly explained they would be required to by law.

I'm not much of a fan of Network Solutions generally, but in this situation, they are not the bad guy. They are impartially following the law. Their letter even goes so far as to helpfully lay out Cryptomes choices. Cryptome made their choice to stand on principle and force the system to shut the whole site down. I assume Cryptome figured the resulting publicity would do more for their fight than taking down the file and keeping their site up, and I also assume they are right.

What is supposed to be interesting about this? (0)

harlows_monkeys (106428) | more than 4 years ago | (#31266338)

The work is in fact a copyrighted work by Microsoft. Cryptome was in fact in violation Microsoft's copyright.

Having read the document, I don't see anything in there that is important. Basically, Microsoft will turn over various kinds of data to law enforcement when legally compelled to, and they only turn over what they are required to. In other words, nothing we didn't already know or suspect. It's not like there is some kind of secret whistleblower information in there.

I suspect that the main reason Microsoft cares about its release is that it includes contact information for law enforcement to contact Microsoft, including telephone numbers, which invites harassment. Cryptome should have redacted that before publishing.

Re:What is supposed to be interesting about this? (1)

ink (4325) | more than 4 years ago | (#31266584)

I found it disturbing that they logged every packet on your Live account for the lifetime of the account (glad I don't use it); but the rest of it is pretty run-of-the-mill.

Is this part of the Microsoft document valid? (0)

Anonymous Coward | more than 4 years ago | (#31266376)

[quote}
2007-2008© Copyright Microsoft Corporation. All rights reserved. Microsoft, MSN,
Hotmail, Xbox and Xbox 360 are trademarks of the Microsoft group of companies. No
part of this handout may be reproduced or transmitted in any form or by any means,
electronic or mechanical, without the written permission of Microsoft Corporation.
[/quote]

arstechnica.com had a story the other day about how the NFL and MLB may be running afoul of these kind of statements.

Pick the right registrar (2, Informative)

Rijnzael (1294596) | more than 4 years ago | (#31266394)

Of course being hosted in the United States is one problem if you want to be an indiscriminate whistle-blower, but an even more serious problem is picking a registrar hosted in the United States. Not only are you and your server host accountable to the DMCA, but so is the company that has the permanent on-off switch to your site's name. When I registered domain names that I thought might ever contain the slightest bit of content that could get me in hot water via the DMCA, I made sure to register my domain names through a registrar which hosts much more notable sites with content in contravention of DMCA. So, I ran a whois on the most notable site I could think of which completely disrespects copyrights (ThePirateBay), and registered my domain names at Key-Systems, http://dd24.net/ [dd24.net] being their consumer-facing site. They might be a bit more of an expense (being that I incur a foreign transaction fee with every registration/renewal), but I think the peace of mind in knowing you won't be losing your domain name due to copyright disputes is very worth it.

We who would all be in chains (0)

Anonymous Coward | more than 4 years ago | (#31266432)

No wonder we're so slow to advance as humans, let alone move off this rock. We're stuck with monopolies squabbling over crumbs.

Take your so-called interoperability, Microsoft, and shove it.

I find it pretty hilarious that... (0)

Anonymous Coward | more than 4 years ago | (#31266444)

4chan is hosted by NS, and that nobody seems to give a shit about all the copyrighted content that flies through there.

I guess the post purging probably puts a stop to most people caring. Huzzahs for (most) imageboard software(s) saving the day again.

Is Legal Lock appropriate? (1)

erroneus (253617) | more than 4 years ago | (#31266478)

Isn't legal lock supposed to be used in cases where the domain name itself is at issue? By refusing to allow the name to be transferred, they are actually censoring the content.

I would be interested to learn if this is an appropriate use of legal lock and if NetSol is entitled to do this. If not, what recourse could be taken?

Actually somewhat reassuring (4, Informative)

slimjim8094 (941042) | more than 4 years ago | (#31266482)

I just read the document and it's really kinda reassuring. They lay out exactly what they require in order to disclose exactly what information, and they don't say anything without a subpoena (gets you name/address/email older than 180 days). Anything more interesting than that requires a court order (for address book/friend list/email to-from) or a search warrant (new email).

Plus, they detail exactly what they do and don't keep - for example, they don't have messenger logs.

Frankly, I thought they had more info than that. They really keep very little info aside from what they need to actually deliver the service.

YMMV due to the Patriot act, etc - but I don't see why MSFT would lie in a confidential document

Read and learn it, or sleep with the fishes. (1)

xactuary (746078) | more than 4 years ago | (#31266650)

Global Criminal Compliance Handbook?

It helps global criminals comply with all those pesky, but obviously important, inter-syndicate deals, capiche?

DMCA and DNS (1)

Sloppy (14984) | more than 4 years ago | (#31266702)

DMCA notice/counternotice rules are clearly about hosts. It's not about directories, names, pointers, etc.

DNS registrars should be able to safely ignore DMCA notices. If they voluntarily cut off service when there's no compulsion to do so, then they're not serious businesses nor legitimate entities in the internet community.

Personally, I can't imagine why anyone would want to do business with Network Solutions due to slimey "customer service" issues, but this even goes deeper than that. C'mon, folks, quit using bogus registrars.

I use and recommend gandi.net due to their track record of just plain not fucking around with their customers. Over the years Gandi has earned their reputation. My only reservation about Gandi is that I haven't kept up-to-date on all the consequences of their being under French jurisdiction, but my tea leaves tell me that I pretty much want to use someone in the EU (with the obvious exception of the United Kingdom).

Load More Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>