From: Anti Vigilante on
On Wed, 2009-10-07 at 21:12 -0700, gnubeard wrote:
> On Oct 7, 1:10 am, Raffael Cavallaro
> <raffaelcavall...(a)pas.espam.s.il.vous.plait.mac.com> wrote:
> > On 2009-10-06 05:36:48 -0400, Evan I <tali...(a)nospam.yahoo.evar.com> said:
> >
> > > Since
> > > the modifications are solely for his own use, he has not violated the
> > > licenses modification clause either.
> >
> > 1. The license specifically prohibits reverse engineering, full stop,
> > not just reverse engineering for commercial purposes.

Let me clear it up.

Suppose he leased a car. He can't change the engine. The car isn't fully
his. But he can change his driving style and reduce weight that he puts
in the car, like say no more than 10 bowling ball. He likes to have 2
dozen.

No reverse engineering has been done.

He did not touch LW. He reverse engineered the platform not the product.

From: Evan I on
Raffael Cavallaro <raffaelcavallaro(a)pas.espam.s.il.vous.plait.mac.com>
writes:

> On 2009-10-06 05:36:48 -0400, Evan I <tali713(a)nospam.yahoo.evar.com> said:
>
>> Since
>> the modifications are solely for his own use, he has not violated the
>> licenses modification clause either.
>
> 1. The license specifically prohibits reverse engineering, full stop,
> not just reverse engineering for commercial purposes.

I really wish whoever wrote that license would clarify the intent of
that clause, I read it a few times and found it could be easily read in
either direction.

5. Copying, Modification and Distribution. You may not
copy the Software except as necessary to exercise your
rights under this Agreement and to make one (1) copy of
the Software in machine readable form for back-up or
archival purposes only. You may not translate, reverse
engineer, decompile, disassemble, modify or create
derivative works based on the materials, except as
expressly permitted by the law of this Agreement. You
may modify the Software and/or merge it into another
program solely for your use in accordance with this
Agreement. Any portion of the Software merged into
another program will continue to be subject to the terms
and conditions of this Agreement. Except for the
distribution of runtime versions of the software
("Runtimes") in accordance with the following paragraph,
this license does not permit the distribution of the
Software, or any part thereof, to any third party.

It seems to me that this clause is fairly clear. But it is presented
here, just to make sure that we are actually talking about the same
clause. I don't see a full stop (aka a period) after the phrase
"reverse engineer", I see a comma. Indeed that sentence has a
sub-clause which informs the reader that there are in fact exemptions.
These are presented later in the same clause of the license. But
without formal legal training or a degree in English I cannot comment
further.

> 2. Once he publishes any reverse engineering and circumvention
> methods, as he has done here, he can no longer make the claim that
> what he is doing is solely for his own personal, educational
> use. Reverse engineering and circumvention for one's own educational
> use is one thing. Publication of that reverse engineering and method
> of circumvention is another thing, and they have very different legal
> statuses.


Again, not to be-labor the point, but he has published his awareness of
a weakness in the programs limitations. He has NOT published a patch
nor distributed a modified copy. Morally his acts are questionable, but
I would argue better for the developer than for the potential exploiter.
/I/ certainly would not have published such a finding in a public forum.
It's very indiscreet, it would have been better to directly inform the
author, or if one where mischievous to keep it a shared secret amongst
friends. Publishing it in a public forum neither serves self-interest
nor the best interests of the creators of LispWorks. But if one of the
interests is served it is more likely than not LispWorks, since I had to
download it just to read the license, and will probably end up truly
testing it out.


-- tali713
From: Dave Searles on
Madhu wrote:
> * gnubeard Wrote on Wed, 7 Oct 2009 21:12:45 -0700 (PDT):
> |
> | Say this all you like - and it is true. But I didn't reverse engineer
> | anything.
>
> You made changes to your environment and observed how the behaviour of
> the software changed (with regard to changes in your environment); with
> the intent of changing the behaviour of a product to overcome an access
> restriction in the product. This constitutes reverse engineering.

It's already been explained that by this standard, almost any action one
takes with one's hardware and operating system "reverse engineers"
multiple pieces of software.

> You reverse engineered the product to circumvent a limitation (access
> restrictions) put in by the owner of the product

Really? I don't recall gnubeard saying he put the access restrictions in
place. If he did, though, it *certainly* can't be immoral for him to
subsequently change his mind and circumvent them.

> You published the results of your reverse engineering, thereby enabling
> others to circumvent the access restrictions which were intended and put
> in place by the owner of the software.

Again, I don't recall gnubeard putting them in place. That had
previously been attributed to LispWorks, but the copy in question is
gnubeard's now, and was by the time of the alleged "reverse engineering".
From: Dave Searles on
Raffael Cavallaro wrote:
> On 2009-10-08 00:15:53 -0400, gnubeard <gnubeard(a)gmail.com> said:
>
>> The guys who reverse engineered the IBM XT were prohibited, legally,
>> from producing a clone based on their research. But they were NOT
>> legally prohibited from publishing papers about their findings.
>> Compaq, the first clone maker, used those papers to build an IBM
>> compatible PC.
>
> This happened before the DMCA.

The DMCA applies to circumvention of copy protection, and only in the
United States.

1. This did not involve copy protection, any more than Skylink making
garage door opener remotes that interoperated with Chamberlain's did.
2. I don't think we know gnubeard's location with certainty at this
time.

> The DMCA exception for reverse engineering explicitly prohibits
> publication of the results.

That has to be nonsense. Security researchers are always publishing
results, and this must be permitted for security reasons. Cybersecurity.
NATIONAL security.
From: Dave Searles on
Dave Searles wrote:
> Raffael Cavallaro wrote:
>> On 2009-10-08 00:15:53 -0400, gnubeard <gnubeard(a)gmail.com> said:
>>
>>> The guys who reverse engineered the IBM XT were prohibited, legally,
>>> from producing a clone based on their research. But they were NOT
>>> legally prohibited from publishing papers about their findings.
>>> Compaq, the first clone maker, used those papers to build an IBM
>>> compatible PC.
>>
>> This happened before the DMCA.
>
> The DMCA applies to circumvention of copy protection, and only in the
> United States.
>
> 1. This did not involve copy protection, any more than Skylink making
> garage door opener remotes that interoperated with Chamberlain's did.

From the appeals court via
http://en.wikipedia.org/wiki/Chamberlain_v._Skylink

* "The plain language of the statute ... requires a plaintiff
alleging circumvention (or trafficking) to prove that the defendant's
access was unauthorized-a significant burden where, as here, the
copyright laws authorize consumers to use the copy of Chamberlain's
software embedded in the GDOs that they purchased. "

That would be that pesky Title 17 Section 117 (a) (1) again, Raffael.

* "The DMCA does not create a new property right for copyright
owners. Nor, for that matter, does it divest the public of the property
rights that the Copyright Act has long granted to the public."

For example, gnubeard's ownership of his copy of LW, and his Section 117
(a) (1) rights vis-a-vis that copy.

"The anticircumvention and anti-trafficking provisions of the DMCA
create new grounds of liability. A copyright owner seeking to impose
liability on an accused circumventor must demonstrate a reasonable
relationship between the circumvention at issue and a use relating to a
property right for which the Copyright Act permits the copyright owner
to withhold authorization-as well as notice that authorization was
withheld."

The Copyright Act permits the copyright holder to withhold authorization
for the following enumerated exclusive rights: reproduction and
adaptation (with the Section 117 (a) (1) exemption for such
reproductions and adaptations as occur as part of normal use of computer
software), distribution, and public performance/display.

It is clear that gnubeard has not publicly performed or displayed LW,
nor distributed it. The remaining exclusive rights don't apply because
any made during gnubeard's use of LW clearly fall within the Section 117
(a) (1) exemption. Therefore the circumvention did not involve "a use
relating to a ... right for which the Copyright Act permits the
copyright owner to withhold authorization".

Therefore, your DMCA-based argument regarding gnubeard's gettimeofday()
hack hasn't got a leg to stand on.

"A copyright owner seeking to impose liability on an accused trafficker
must demonstrate that the trafficker's device enables either copyright
infringement or a prohibited circumvention."

And that torpedoes your argument regarding his posting of information
here. Since there was no copyright infringement and, as per the above
argument, no "prohibited circumvention", it looks to me like gnubeard is
free and clear even if he is within the borders of the United States.

Now stick THAT in your pipe and smoke it.