> Again, the design properties of Tahoe blur the concept of whose data is
> actually on the cluster. From the outside looking in, the contents of data
> you provide to the cluster is cryptographically opaque. Unless they can
> prove you have the cryptographic keys to access a particular piece of
> content, you can make the argument that you literally had no way of knowing
> that the encrypted data you are storing was in fact pirated content.


  That's not necessarily true -- someone might claim to 
  have told you that unlawfully copied content being stored;
  whether or not you had access to this data in unencrypted
  form may not actually matter.


  Quoting from:
  http://www.quizlaw.com/copyrights/what_is_contributory_infringem_1.php
  http://www.quizlaw.com/copyrights/what_is_vicarious_infringement.php


      Contributory infringement is one of the two types of indirect
      copyright infringement (vicarious infringement is the other type
      of indirect infringement). Contributory infringement occurs where
      someone knows that infringing activity is taking place and either
      induces it, causes it, or materially contributes to it. So there
      are two elements required to proving contributory infringement -
      that the infringer knew or had reason to know of the infringing
      activity (which differs from direct infringement, where the
      infringer doesn't have to have any knowledge or intent) and
      active participation in the infringement (which can include
      inducing it, causing it or contributing to it). So for example,
      if your brother has made infringing copies of a CD, and you know
      these copies are infringing and help create an e-bay listing for
      your brother to sell the discs, you have committed contributory
      infringement.

      Vicarious infringement occurs where someone has a direct
      financial interest in the infringing actions being committed by
      another and has the ability to control it, even if they do not
      know that the infringement is taking place and do not directly
      take part in it.  One of the classic examples of vicarious
      infringement is where someone owns a swap meet, and somebody at
      the swap meet is selling infringing materials. The owner of the
      swap meet is liable for vicarious infringement because he
      receives a direct financial benefit and has the ability to see
      what is going on at the swap meet and prevent the seller from
      selling the infringing materials (by kicking him out).


  Has anybody looked into contributory & vicarious infringement laws
  to see how at-risk the operator of a system like Tahoe-LAFS might 
  be to this type of litigation -- or to "fishing expedition" style
  lawsuits?



                -Jon
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to