×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Six strick warning from internet providers for illegal downloads begins

mynameiskhan (2689067) writes | about a year ago

The Internet 1

mynameiskhan (2689067) writes "Major internet service providers will monitor the internet traffic 'to' the customer's computer and will warn them if they download copyrighted materials using peer to peer network. The article says "A person will be given up to six opportunities to stop before the Internet provider will take more drastic steps, such as temporarily slowing their connection, or redirecting Internet traffic until they acknowledge they received a notice or review educational materials about copyright law.". Furthermore, if you appeal the warning you will be required to pay $35 to stake your claim. Have the ISPs have had enough of RIAA pestering or are they siding with RIAA?"
Link to Original Source

1 comment

Is this inside out... (1)

niftymitch (1625721) | about a year ago | (#43020319)

Is this inside out.

Copyright has to do with the rights to distribute and profit from. It does not limit the reading and viewing.... This appears to be an attack on the reader and viewer.

In the US the rights and laws associated with freedom of speech has an implicit right to listen to and read/view free speech.

More troubling to me is the risk to the communication structure of the nation. This seems to be an attack on p2p communications. This attack on p2p communications is a necessary step in the attack on freedoms of expression. It establishes a man in the middle listening post for all internet communication. We recently had disclosed to us the Nokia man in the middle "network optimizations" where connections were decrypted to permit caching. However this is implicit editing in the raw.

Companies and others need to understand this man in the middle attack and the risk that it has for trade secrets and for liabilities of all types.

And WTF the original poster cannot spell.... I guess he is free to do so.

Check for New Comments
Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...