Feeds

RIAA chief calls for copyright filters on PCs

By deception or force if necessary

Build a business case: developing custom apps

When is a virus not a virus? When it's sending your personal data to the Recording Industry Association of America, silly.

Internet advocacy website Public Knowledge has posted a highlight reel from the State of the Net Conference, where RIAA boss Cary Sherman suggests that internet filtering sorely lacks the personal touch of spyware.

While ISP-level filtering dragnets such as those proposed by AT&T have their way of catching the sloppier digital music thieves out there, the technology is more-or-less bypassed by basic file encryption.

That's why Sherman recommends finding a way to install filtering software directly onto people's home PCs.

"One could have a filter on the end-user's computer that would actually eliminate any benefit from encryption. Because if you want to hear it [the music], you would need to decrypt it. At that point the filter could work," said Sherman.

"Why would somebody want to put that on their machine? They wouldn't likely want to do that," mused Sherman.

Why indeed?

"They'd do that when it benefits them such as for viruses and so on and so forth. But that's the sort of thing that could be enforced whether at the modem or something that's put in by an ISP."

Ah, trickery. But perhaps you'll need some rationalization so it doesn't sound like your average run-of-the-mill nefarious spyware.

"I don't think you should underestimate the educational benefit of these kind of things. A lot of this is basically letting people know that what you're doing here is not OK."

Education. Perfect. If history is any judge, we're sure the RIAA's legal department will find a very reasonable and scholarly way of setting a person back on the straight and narrow. Meanwhile the vast majority who don't steal music will be happy knowing the RIAA is scanning every packet of their incoming data in the name of academia.

Catch the highlights here. Or see the full conference here (watching an hour of streaming Real Player video is done at your own risk). ®

The essential guide to IT transformation

More from The Register

next story
Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
Tip: Put the shades on and you'll look less of a spanner
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
One step closer to ROBOT BUTLERS: Dyson flashes vid of VACUUM SUCKER bot
Latest cleaner available for world+dog in September
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.