Feeds

RIAA chief calls for copyright filters on PCs

By deception or force if necessary

High performance access to file storage

When is a virus not a virus? When it's sending your personal data to the Recording Industry Association of America, silly.

Internet advocacy website Public Knowledge has posted a highlight reel from the State of the Net Conference, where RIAA boss Cary Sherman suggests that internet filtering sorely lacks the personal touch of spyware.

While ISP-level filtering dragnets such as those proposed by AT&T have their way of catching the sloppier digital music thieves out there, the technology is more-or-less bypassed by basic file encryption.

That's why Sherman recommends finding a way to install filtering software directly onto people's home PCs.

"One could have a filter on the end-user's computer that would actually eliminate any benefit from encryption. Because if you want to hear it [the music], you would need to decrypt it. At that point the filter could work," said Sherman.

"Why would somebody want to put that on their machine? They wouldn't likely want to do that," mused Sherman.

Why indeed?

"They'd do that when it benefits them such as for viruses and so on and so forth. But that's the sort of thing that could be enforced whether at the modem or something that's put in by an ISP."

Ah, trickery. But perhaps you'll need some rationalization so it doesn't sound like your average run-of-the-mill nefarious spyware.

"I don't think you should underestimate the educational benefit of these kind of things. A lot of this is basically letting people know that what you're doing here is not OK."

Education. Perfect. If history is any judge, we're sure the RIAA's legal department will find a very reasonable and scholarly way of setting a person back on the straight and narrow. Meanwhile the vast majority who don't steal music will be happy knowing the RIAA is scanning every packet of their incoming data in the name of academia.

Catch the highlights here. Or see the full conference here (watching an hour of streaming Real Player video is done at your own risk). ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.