Quote:
Originally Posted by gideongallery
a bit by bit packet sniffer and the transmit to address is all i need to take an unauthorized copy from cablevision system.
|
Really ? So now your file sharing is OK because you can package sniff the data otherwise from cablevision ?
I already explained the difference in how it's recorded, distributed and stored. I never said any data had to be with a specific corporate or private entity to be considered a private copy.
It doesn't matter in the end since you focus on the theory and ideology for the general usage which doesn't legalize the actual usage.
You may also want to look into the law of agency as your swarm could be considered your agents since you claim they provide you private storage, if it could be determined that you with common sense would realize it's not the case or that it's in other ways being abused in ways you should be aware of it could be ruled that you adopted the act of your agent so strict liability could be enforced.
And really, what would a judge say if you claim in front of him "it's no different than if I used a package sniffer to get my copy that way"
Your arguments are based on ideology and several unsupported facts or speculations (0.005% unauthorized usage is an outrages statement) which is why there is no real reason to undermine that statement. I think it's more interesting just to point out new ways to fight your "case"
If I was the person fighting these cases my goal would be to take settlements when I can and if people fight I'd aim for personal bankruptcy of the individual to set out examples to make future settlements easier.