Highest EU Court Considers Criminalizing Website Hyperlinks

7

The highest court in the European Union this week heard arguments which could impact the ability to link to content on the Internet.

Presiding over a case threatening the nature of the web as we know it, the European Court of Justice (CJEU) on Wednesday debated whether website hyperlinks to content which infringes copyright laws should be permitted.

The court heard arguments regarding the GS Media case, in which a popular Dutch blog site posted links to leaked photos on a separate file hosting site.

Arguing the central role hyperlinks play in the digital environment, the Computer & Communications Industry Association (CCIA) wrote that linking to content freely available online should be legal and was already ruled on by the court in earlier cases.

“If this capacity to link is put in doubt, the web would lose its universality and power,” the CCIA wrote. “The most important information medium of our time would be hobbled.”

The EU’s assault on hyperlinks was not without warning.

Last November, European Parliament member Julia Reda said the “European Commission is preparing a frontal attack on the hyperlink, the basic building block of the Internet as we know it,” and warned the commission’s decision to “break the Internet” could also affect American websites linking to European content.

Follow the links.

Read more at www.prisonplanet.com

Please sign the petition savethelink.org

Ancillary Copyright 2.0 MEP Julia Reda

It’s up to us to save the internet. They will try anything to take it away from us. Without internet freedom we would be back to the main stream media to get our information, which is heavily controlled – They only tell us what they want us to know. (Forsooth) 

Advertisements
Published in: on February 7, 2016 at 09:41  Leave a Comment  
Tags: , , , , ,

Investigating Alternatives To Microsoft Windows Can Get You On The NSA List

serveimage
Simply using certain encryption services or investigating alternatives to Microsoft Windows could get you placed under surveillance by the National Security Agency (NSA) and other intelligence organizations, according to a new report.

Utilizing encryption solutions such as TOR could result in monitoring by the NSA and its allies, including Britain’s Government Communications Headquarters (GCHQ), according to the report in the German me­dia out­let Ta­gesschau.

The NSA tracks people with a surveillance tool called XKeyscore.

“Anyone who is determined to be using Tor is also targeted for long-term surveillance and retention,” Corey Doctorow wrote at the BoingBoing.net blog.

The German outlet said computer experts watched the XKeyscore code and found that the NSA was constantly monitoring TOR users on servers at MIT’s Computer Science and Artificial Intelligence Laboratory, the National Journal reported.
Read more at govtslaves.info

Published in: on December 26, 2015 at 07:45  Leave a Comment  
Tags: , , , ,

Final Goal of the Surveillance State

nsa-610x250

Surveillance is coming at us from all angles. Chips, drones, TSA checkpoints, smart meters, back-doored electronic products, video cameras, spying home appliances; our phone calls and emails and keystrokes and product purchases are recorded.

The government and its allied corporations will know whatever they want to know about us.

What then?

Water, food, medicine, land use, transportation—they all become items of a networked system that chooses who gets what and when, and who can travel where, and under what conditions.

activistpost.com

Published in: on March 12, 2014 at 21:06  Leave a Comment  
Tags: ,

Attackers trick 162,000 WordPress sites into launching DDoS attack

ddos

Security researchers have uncovered a recent distributed denial-of-service (DDoS) attack that used at least 162,000 WordPress-powered websites to knock another site offline.

The technique made it possible for an attacker with modest resources to greatly amplify the bandwidth at its disposal. By sending spoofed Web requests in a way that made them appear to come from the target site, the attacker was able to trick the WordPress servers into bombarding the target with more traffic than it could handle. Besides causing such a large number of unsuspecting sites to attack another one, the attack is notable for targeting XML-RPC, a protocol the sites running WordPress and other Web applications use to provide services such as pingbacks, trackbacks, and remote access to some users.

Researchers from security firm Sucuri recently counted more than 162,000 legitimate WordPress sites hitting a single customer website. They suspect they would have seen more if they hadn’t ended the attack by blocking the requests.

arstechnica.com

Published in: on March 12, 2014 at 20:55  Leave a Comment  
Tags: , , ,