Feeds

Lessig blesses DRM

It's open source DRM, so it's good. Huh?

Top three mobile application threats

If you arrive for work today and discover a grisly pool of brain tissue and bone fragments where a colleague used to sit, we may have the explanation right here.

For in a move that risks causing Scanners-style head explosions across the land, Professor Lawrence Lessig has endorsed DRM.

Not just any old digital rights management, but Sun's open source DRM initiative, the Open Media Commons.

"In a world where DRM has become ubiquitous, we need to ensure that the ecology for creativity is bolstered, not stifled, by technology,". says Lessig - or somebody purporting to be Lessig.

"We applaud Sun's efforts to rally the community around the development of open-source, royalty-free DRM standards that support 'fair use' and that don't block the development of Creative Commons ideals," says Lessig.

Debian coder and software freedom campaigner Benjamin Mako Hill finds this strange. "Lessig's position seems to be that DRM is bad and should not exist. But in a world where it does exist, he thinks that not-quite-so-bad DRM is better than the alternatives. Is that the sort of message we want to be sending?," he writes.

"The fact that the software is 'open source' is hardly good enough if the purpose of the software is to take away users freedom - in precisely the way that DRM does."

Presumably, Lessig's position is that the development process has sanctified the evil. But others may take the view that a noose is a noose is a noose. As Mako points out, Lessig sits on the board of the Electronic Frontier Foundation - which has already come out against Sun's OMC - and the Free Software Foundation. Whose position on software freedom should be clear enough .

Lessig thinking

"Hmm. Why won't this song play?" - Professor Lawrence Lessig

Maybe it's all a terrible mix up. Or maybe ... maybe it's a really bad dream!

We'll certainly be exploring this issue tomorrow with both Sun Microsystems and the Great Man (one of these parties is speaking to us - while the other is sulking at us - and you can guess which one is which) tomorrow.

But given the health risks this news poses, we felt it best to warn you without delay. ®

Top three mobile application threats

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.