| Tsudai said: Taken from http://www.chillingeffects.org/anticircumvention/faq.cgi which can be found from the link provided by Kasz216: "Question: What are technological protection measures?
Answer: Technological protection systems are already in place in DVDs, eBooks, video game consoles, robotic toys, Internet streaming, and password-protected sections of web sites. The fact that a digital protection may be really weak and easy to circumvent has not prevented courts from applying this law to punish those who bypass them.(Bolded for emphasis) The DMCA defines an access control mechanism as a measure which "in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work." [1201(a)(3)(B)] An access control is a technology, like a password or encryption that controls who or what is able to interact with the copyrighted work. It is a violation of the DMCA to circumvent access controls, but it is also a violation to provide tools to others that circumvent access controls (including selling, distributing free of charge, and possibly even linking to a site with such technology ? or even the source code).(Bolded for emphasis) The DMCA defines a copy control mechanism as a measure which, "in the ordinary course of its operation, prevents, restricts, or otherwise limits the exercise of a right of a copyright owner." [1201(b)(2)(B)]. Technological systems designed to protect against copyright infringement control whether the work can be copied, how many copies can be made, how long you can have possession of the work, etc. It is a violation of the DMCA to provide tools to others that circumvent copy controls [1201(b)], but it is not a violation of the DMCA to engage in the act of circumventing copy controls. Rather, the provision serves to buttress prohibitions against infringing activities of traditional copyright law."
Geohot found a way to circumvent "access controls" put in place on the PS3. He also posted the keys that would allow others to circumvent these "access controls". By posting the keys on his site for everyone who visted his site to see, he is possibly in violation of the DMCA. |
I think you need to read this part
Question: What is a circumvention tool?
Answer: The prohibited tools under the DMCA are the programs which are primarily designed or produced for the purpose of circumvention of an access [1201(2)(a)] or copy control [1201(b)(1)(A)] mechanism. These programs can come in various forms including products, services, devices, or components. The DMCA includes in its definition of circumvention tools that these devices have limited commercially significant purposes other than circumvention or are marketed to be used for circumvention [1201(2)(B-C)], 1201(b)(1)(B-C)].
Aside from which, this doesn't include the many circumvention issues, espiecally when you try and merge access and copy controls.
And the exception that allows
Reverse engineering in order to develop interoperable programs; [1201(f)]
(f) Reverse Engineering. -
- (1) Notwithstanding the provisions of subsection (a)(1)(A), a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure that effectively controls access to a particular portion of that program for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs, and that have not previously been readily available to the person engaging in the circumvention, to the extent any such acts of identification and analysis do not constitute infringement under this title.
- (2) Notwithstanding the provisions of subsections (a)(2) and (b), a person may develop and employ technological means to circumvent a technological measure, or to circumvent protection afforded by a technological measure, in order to enable the identification and analysis under paragraph (1), or for the purpose of enabling interoperability of an independently created computer program with other programs, if such means are necessary to achieve such interoperability, to the extent that doing so does not constitute infringement under this title.
- (3) The information acquired through the acts permitted under paragraph (1), and the means permitted under paragraph (2), may be made available to others if the person referred to in paragraph (1) or (2), as the case may be, provides such information or means solely for the purpose of enabling interoperability of an independently created computer program with other programs, and to the extent that doing so does not constitute infringement under this title or violate applicable law other than this section.
- (4) For purposes of this subsection, the term ''interoperability'' means the ability of computer programs to exchange information, and of such programs mutually to use the information which has been exchanged.
For example. To allow homebrew programs to work with the PS3.
As far as i can tell they have to prove the intent was piracy in the first place. Since the DMCA is supposed to only be enforced when it's protecting the creative aspects of work.












