Feeds

Hackers take on MS on copyright protection for eBooks

Legally fraught

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Irked at his inability to read Microsoft eBooks on his older Win CE device, UK programmer Dan Jackson has set up a project to improve file conversion tools.

Jackson obtained the source code of a program called Convert Lit (or clit.exe, no sniggering at the back there) from its developers and posted it on his Web site.

He wants to canvass the community about the development of Convert Lit, so far available only as a command line utility which removes DRM5 copyright protection from Microsoft Reader format files.

Jackson's aims, to allow MS reader files to be converted to formats supported by text to speech conversion programs or PDAs not running Redmond's Pocket PC software, have something in common with that of ElcomSoft, the developer of Advanced eBook Reader.

In developing its software, ElcomSoft landed itself with a prosecution under America's controversial Digital Millennium Copyright Act.

Elcom was subsequently acquitted, but we feel that Jackson and the developers of Convert Lit are straying into risky legal territory, regardless of their motives (Jackson is clearly states that he wants to develop tools only for those who've obtained legitimately purchased Microsoft-format eBooks.)

Jackson believes what he's doing is legal. "As far as I am aware, it is, as the Berne Convention appears to explicitly allow fair use," he states on his site.

The Berne Convention also explicitly gives moral rights to authors of copyright work, a principle written into UK law, through the Copyright, Designs and Patents Act. This gives copyright holders the legal tools in the UK to pursue action against copyright crackers, however benign their intentions.

And new laws will make it even easier for copyright holders. The Copyright Directive expressly prohibits the creation or distribution of tools that bypass copyright protection (for whatever reason). The UK is still consulting over how best to implement the European Commission's Copyright Directive (AKA Europe's DMCA), but legislation will pass through Parliament this year. ®

Related Stories

Greece, Denmark (and no-one else) make EC copyright deadline
UK's DMCA: there ain't no sanity clause
So sorry Adobe urges more DMCA busts
Elcomsoft not guilty - DoJ retreats from Moscow
MS eBook cracker keeps findings secret

Internet Security Threat Report 2014

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.