Feeds

Patent shark‘s copyright claim could bite all Unix

Cook Islands entity claims rights to code present in *nix, MacOS, Windows

Boost IT visibility and business value

April Fool A company registered in minor league tax haven the Cook Islands, but with a subsidiary in Delaware, lawyers in the patent-troll heaven of East Texas and an office in Sydney, Australia, has asserted intellectual property rights over all versions of Unix and “Unix-like derivatives” and plans to seek royalties from every company that has ever used the operating system.

The company, FourOne IP, is a non-practising entity whose registered address is a Sydney accountant, a not unusual arrangement for companies seeking to take advantage of the Cook Islands’ tax laws. Despite its humble appearance, it nonetheless appears to have sufficient backing to engage high-powered attorneys to launch their World+Dog lawsuit.

An attorney identifying himself as Ernest K Malley, who spoke to The Register on condition of anonymity, said forensic analysis of all known Unix derivatives had taken nearly three decades, but that the company recently is confident today's copyright filing will succeed.

Malley explained that a “hundreds” of lines of code the company owns appear to be copied across all *nix variants, but had only come into widespread use in recent years, as the emergence of social media sites YouTube, Facebook, Reddit, Twitter, Tumblr and GrovelR has led to a change in loads on servers. Analysis of the resulting logs has revealed that a long-neglected piece of code called the ‘nsfw daemon’ present in every *nix variant going back to Bell Labs is now pressed into use with great regularity. The daemon is especially important to the online adult entertainment industry.

Malley said FourOne IP has acquired companies that can prove ownership of the daemon and that it will now exercise its rights.

“It's clear that some far-sighted Unix pioneer created this daemon even though it has only become useful in the last few years,” he said, “That the insight is significant is obvious from the fact the code has been copied not only throughout Unix but into the Windows code stream via NT, and Apple's world via BSD. It appears to us that NSFW is also present throughout the code base of every significant Linux distribution,” he added.

Pressed on FourOne IP’s intentions, Malley offered the following warning: “If I were Cisco, I’d increase my patent litigation budget to rather more than $50m a year. We’re a well-funded outfit with a righteous cause, because the code we own is crucial to so many operations.”

Malley said even Linux companies need to watch out. “Linus Torvalds needs to start looking down the back of the sofa for some coins,” he said. “By the time we’re done, he’ll need them to buy food.” ®

5 things you didn’t know about cloud backup

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Intel's Raspberry Pi rival Galileo can now run Windows
Behold the Internet of Things. Wintel Things
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Time to move away from Windows 7 ... whoa, whoa, who said anything about Windows 8?
Start migrating now to avoid another XPocalypse – Gartner
You'll find Yoda at the back of every IT conference
The piss always taking is he. Bastard the.
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.