Some Relaxing on the DMCA Regulations


There seems to be have been some slight relaxation on the DMCA regulations lately, which is a good thing for the majority of people!

There have been many grey cases and sadly most have fallen on the side of the big corporations, finally something on our side!

The U.S. Copyright Office specified new rules Wednesday allowing cellphone owners to hack software designed to prevent them from using their phones on competing carriers. Retrogaming enthusiasts will also be permitted to crack copy protection on abandoned titles, albeit for “archival” purposes only.

I think it’s perfectly reasonable, if I buy a peice of hardware or whatever I should completely own it and be able to use it for whatever I want, I shouldn’t be limited by the company that sold it to me.

And Abandonware is ok!

And thankfully a thumbs up for educators too.

The rules also allow teachers to copy “snippets” from DVDs for educational compilations, and confer the right to have third-party software read copy-protected electronic books –if you’re blind.

The Digital Millenium Copyright Act (DMCA) has been held to crimizalize circumvention of any kind of software protection, even in the pursuit of applications that would have previously been considered fair use. There is at least one ongoing legal action concerning recycled cell phones based on this law, according to Librarian of Congress James H. Billington. But not after today.

You can see the full list of 6 exemptions here.

Source: Wired Blog

Posted in: Legal Issues

, , , ,


Latest Posts:


LibInjection - Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks.
Grype - Vulnerability Scanner For Container Images & Filesystems Grype – Vulnerability Scanner For Container Images & Filesystems
Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based OS.
APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.
GitLab Watchman - Audit Gitlab For Sensitive Data & Credentials GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials
GitLab Watchman is an app that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally, this includes code, commits, wikis etc
GKE Auditor - Detect Google Kubernetes Engine Misconfigurations GKE Auditor – Detect Google Kubernetes Engine Misconfigurations
GKE Auditor is a Java-based tool to detect Google Kubernetes Engine misconfigurations, it aims to help security & dev teams streamline the configuration process
zANTI - Android Wireless Hacking Tool Free Download zANTI – Android Wireless Hacking Tool Free Download
zANTI is an Android Wireless Hacking Tool that functions as a mobile penetration testing toolkit that lets you assess the risk level of a network using mobile.


Comments are closed.