DonK's blog

Can I not avoid traffic shaping?

Recently, I rid myself of my Bell Sympatico account. Their policies, traffic shaping included, finally bothered me enough to switch ISPs. This time, I decided to go with an ISP with policies that I could support: the NCF. They provide a decent service, backed by teksavvy with decent policies. Now, much to my frustration, it seems that Bell has found a way to shape traffic through ISPs who don't support their silly practises.

Who benefits from the camcordering law?

On my lunch, I skimmed over an article about the first arrest under Canada's recent anti-camcordering law. A particular quote struck me:

The association also credits the industry's investment in a series of technological systems.

Clear example of a net neutrality violation

On Freedom to Tinker today, Ed Felton posted an excellent, clear-cut example of why network neutrality is necessary. In this case, Verizon redefines the long standard behaviour of DNS in order to redirect traffic to a site from which they derive profit. This example is simpler than traffic shaping instances which are often explained as network management issues (I don't consider this a legitimate excuse. Many politicians may though).

RCMP do not consider file sharing a priority

A recent article from Le Devoir suggests that the RCMP is not concerning itself with prosecuting people who share files online. A quote form the force suggests that they are much more concerned with those counterfeit goods (fake drugs, for example) that have a real impact on Canadians.

The real question now is whether the copyright industry and music lobbyists will use this as another verse in their ongoing refrain for legislation that "gives them the tools to prosecute".

Is encryption only used for illegal purposes?

Apparently, more and more torrent users are resorting to encryption. There is a suggestion by a BPI spokesman that this technology is being used to hide illegal activities.

The BPI is an arm of the RIAA, so it is no wonder that they come to a conclusion that suits their political agenda. Perhaps there is another explanation?

The RIAA versus Internet radio

Many people in the technology industry understand the massive benefit of independent Internet radio for artists. The RIAA seems to think differently. In the US, this lobby group persists in lobbying for a return to the Good Ol' Days when their members (or those who fell in line with the cartel) controlled distribution and marketing of music. Wil Wheaton provides an excellent breakdown of the RIAA's recent activities with respect to Internet radio.

Uncovering the source of counterfeit loses

In his latest column, Michael Geist explains the source of the infamous RCMP statistic abused by the copyright lobbyists and parroted by the media. Since this statistic seems to be driving copyright reform in Parliament, one would expect that the RCMP had derived it from reputable and substantiated sources.

Physical access to the device is 9/10ths of control

On Friday (Sept. 14, 2007), many sites were reporting that newer versions of Apple's famous iPod could not be used with free software (actually, any non-iTunes software). It appears that Apple introduced what appear to be cryptographic hashes in the database stored on it's newer models of iPods. Most critics have assumed this is a form of DRM designed to protect Apple's market share in the guise of protecting the media on the device.

HMV listens to customers; CRIA? Not so much

Michael Geist has posted an interesting letter from a Canadian music industry insider. The letter describes what have become the most common, rational explanations for the decline in CD sales in Canada. Also included is a decent breakdown of CRIA's sales reporting strategy and what their numbers actually represent. Most of this is the standard information that those of us who disagree with the rhetoric published by this upper echelon organization.

Syndicate content