hp-drm-og_0

HP “Time Bomb” Locks Out 3rd Party Ink Cartridges

The Guardian Alex Hern
Hewlett-Packard printers have suddenly started rejecting ink cartridges produced or refilled by third parties, apparently due to a “ticking timebomb” left by the manufacturer in an update released in March 2016.
The printers, in the company’s OfficeJet, OfficeJet Pro and OfficeJet Pro X ranges, accepted refills made by third-parties and sold at a significantly lower price than the official ink made and sold by HP itself. But on 13 September, the printers began to reject those refills, with error messages including “cartridge problem”, “one or more cartridges are missing or damaged” and “older generation cartridge”.
Adding insult to injury, the printers themselves have not received a software update recently, suggesting that the last update, six months ago, had a delayed-action effect. In doing so, it prevented affected users from getting the word out about the lockdown and discouraging others in a similar situation from updating their own printers.  read more…
UPDATE  HP issued a non-apology and made it possible for users to back out the change by applying patched firmware to their printers.  See the HP Blog Post. “As a remedy for the small number of affected customers, we will issue an optional firmware update that will remove the dynamic security feature. We expect the update to be ready within two weeks and will post additional information here as it becomes available”.  Emphasis is mine.
library_congress

Librarian of Congress Renews and Expands Protections for Fair Uses

The new rules for exemptions to copyright’s DRM-circumvention laws were issued today, and the Librarian of Congress has granted much of what EFF asked for over the course of months of extensive briefs and hearings. The exemptions we requested—ripping DVDs and Blurays for making fair use remixes and analysis; preserving video games and running multiplayer servers after publishers have abandoned them; jailbreaking cell phones, tablets, and other portable computing devices to run third party software; and security research and modification and repairs on cars—have each been accepted, subject to some important caveats.

The exemptions are needed thanks to a fundamentally flawed law that forbids users from breaking DRM, even if the purpose is a clearly lawful fair use. As software has become ubiquitous, so has DRM. Users often have to circumvent that DRM to make full use of their devices, from DVDs to games to smartphones and cars.

The law allows users to request exemptions for such lawful uses—but it doesn’t make it easy. Exemptions are granted through an elaborate rulemaking process that takes place every three years and places a heavy burden on EFF and the many other requesters who take part. Every exemption must be argued anew, even if it was previously granted, and even if there is no opposition. The exemptions that emerge are limited in scope. What is worse, they only apply to end users—the people who are actually doing the ripping, tinkering, jailbreaking, or research—and not to the people who make the tools that facilitate those lawful activities.

Read more …..

mystic2

NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls

The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.

 

Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices

 

"Our lives are on our laptops – family photos, medical documents, banking information, details about what websites we visit, and so much more. Thanks to protections enshrined in the U.S. Constitution, the government generally can’t snoop through your laptop for no reason. But those privacy protections don’t safeguard travelers at the U.S. border, where the U.S. government can take an electronic device, search through all the files, and keep it for a while for further scrutiny – without any suspicion of wrongdoing whatsoever."

The EFF has an excellent article by Seth Schoen, Marcia Hofmannand Rowan Reynolds online here or you can download the PDF.