Feeds

BBC Trust won't probe iPlayer open source gripes

Tells users to 'Have Your Say' via online survey instead

Remote control for virtualized desktops

Mad Men and English dogs go out in midday sun

"This is about excluding some classes of device and some platforms, and locking users in to specific technology. The piracy argument is moot because the pirates will continue unhindered, and the only people being punished are the legitimate users," argued a commenter named Lens on the BBC's internet blog.

"I feel that this is about content providers stamping their feet because they didn't realise people could watch content through a TV, and the 'new delivery channel' dollar signs faded from their eyes. This is why I feel it is important to understand why the Wii is considered to be acceptable."

The BBC's Nick Reynolds responded to some of the gripes about the XBMC plugin last Friday afternoon in which he explained that it was the corporation's policy to check for "unauthorised third-party apps that may or may not respect BBC content rights."

The Beeb only allows a device access to its content after checking that such a plugin isn't taking a stealth download to either keep the data for more than seven days or allow for a download outside the UK. However, that system isn't altogether foolproof. After all, as many have noted, there is a work around for users who want to circumnavigate the SWF verification.

"Recently a number of applications were identified making unauthorised use of a number of our media types, and so we implemented enhanced security - importantly this was done for several of the formats and content delivery types, not just for Flash," said Reynolds. "The result was that a number of applications that ‘deep link’ to our content may no longer work.

"I'm told that most of iPlayer is built on open source products, so this isn't about the BBC being anti open source. However, BBC content needs to be protected from applications that make unauthorised calls to it, even if those applications are open source."

Needless to say, this is a debate that will run and run. But, as the BBC Trust told us in its statement on the matter, iPlayer users who complain about the open source plugin exclusion during the current consultation process shouldn't expect a response anytime soon. ®

Internet Security Threat Report 2014

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.