Some Relaxing on the DMCA Regulations

Outsmart Malicious Hackers


There seems to be have been some slight relaxation on the DMCA regulations lately, which is a good thing for the majority of people!

There have been many grey cases and sadly most have fallen on the side of the big corporations, finally something on our side!

The U.S. Copyright Office specified new rules Wednesday allowing cellphone owners to hack software designed to prevent them from using their phones on competing carriers. Retrogaming enthusiasts will also be permitted to crack copy protection on abandoned titles, albeit for “archival” purposes only.

I think it’s perfectly reasonable, if I buy a peice of hardware or whatever I should completely own it and be able to use it for whatever I want, I shouldn’t be limited by the company that sold it to me.

And Abandonware is ok!

And thankfully a thumbs up for educators too.

The rules also allow teachers to copy “snippets” from DVDs for educational compilations, and confer the right to have third-party software read copy-protected electronic books –if you’re blind.

The Digital Millenium Copyright Act (DMCA) has been held to crimizalize circumvention of any kind of software protection, even in the pursuit of applications that would have previously been considered fair use. There is at least one ongoing legal action concerning recycled cell phones based on this law, according to Librarian of Congress James H. Billington. But not after today.

You can see the full list of 6 exemptions here.

Source: Wired Blog

Posted in: Legal Issues

, , , ,


Latest Posts:


OWASP ZSC - Obfuscated Code Generator Tool OWASP ZSC – Obfuscated Code Generator Tool
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.
A Look Back At 2017 – Tools & News Highlights A Look Back At 2017 – Tools & News Highlights
So here we are in 2018, taking a look back at 2017, quite a year it was. Here is a quick rundown of some of the best hacking/security tools released in 2017, the biggest news stories and the 10 most viewed posts on Darknet as a bonus.
Spectre & Meltdown Checker - Vulnerability Mitigation Tool For Linux Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
Hijacker - Reaver For Android Wifi Hacker App Hijacker – Reaver For Android Wifi Hacker App
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app.
Sublist3r - Fast Python Subdomain Enumeration Tool Sublist3r – Fast Python Subdomain Enumeration Tool
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.
coWPAtty Download - Audit Pre-shared WPA Keys coWPAtty Download – Audit Pre-shared WPA Keys
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys.


Comments are closed.