[linux-elitists] Legitimate crypto circumvention examples
Karsten M. Self
Thu Aug 2 15:52:29 PDT 2001
on Thu, Aug 02, 2001 at 03:14:44PM -0700, Don Marti (firstname.lastname@example.org) wrote:
> begin Karsten M. Self quotation of Thu, Aug 02, 2001 at 03:06:04PM -0700:
> > This questioner really has a hard time comprehending *why* circumvention
> > tools would be legitimate in any context.
> I can't come up with a context where a copy-restriction system
> itself would be legitimate.
That's one of the points I'm making.
> If your questioner believes that copyright holders have an absolute
> right of control over all use of copyrighted works, you're probably
> in a pointless argument.
But in this case my opponent is pretty demonstrably wrong: there are 16
exceptions to exclusive rights under US copyright law. I'd defy him to
Karsten M. Self <email@example.com> http://kmself.home.netcom.com/
What part of "Gestalt" don't you understand? There is no K5 cabal
Free Dmitry!! Boycott Adobe!! Repeal the DMCA!! http://www.freesklyarov.org
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 232 bytes
Desc: not available
Url : http://allium.zgp.org/pipermail/linux-elitists/attachments/20010802/a649acd2/attachment.pgp
More information about the linux-elitists