Tag Archive for: though

TV Network Declares IPTV Tool Copyright Infringing, Even Though It’s Just A Tool

To a certain segment of the population, just mentioning IPTV is enough to get them frothing at the mouth and shouting “copyright infringement” at anyone who will listen. This isn’t entirely without cause, of course, as IPTV is a technology that can be used to infringe by streaming copyrighted TV shows and films. There are entire sites out there that list such infringing content, as well. But the fact remains that IPTV is a tool, not content that infringes copyright itself. As such, there are plenty of IPTV-related tools and uses out there that are perfectly legit.

Like Perfect Player, for instance. Perfect Player is an android app that allows the user to choose what IPTV playlists from 3rd party providers can be played. In other words, it’s essentially a media player for IPTV streams. Upon installation, it does not come with infringing playlists to stream. What is watched on the player is entirely the choice of the end user. Despite all of this, one unnamed major pay-TV company filed a copyright complaint against the app with Google, arguing that because end users can use Perfect Player to infringe on copyright, the app itself was infringing. Google, frustratingly, complied and has delisted the app from the Play Store.

This week, however, the software – which has in excess of a million downloads from Google Play – was removed by Google because of a copyright complaint. It was filed by a major pay-TV provider, the name of which we’ve agreed not to publish while the complaint is ongoing.

It states that the software allows users to watch channels from unauthorized sources and is therefore illegal. However, there appears to be a considerable flaw in the pay-TV company’s arguments.

In common with the developers behind various torrent clients, Perfect Player’s developer doesn’t dictate how the software is used because no control can be exercised over that. Just like Windows Media Player, uTorrent, or even VLC (which has similar capabilities), it can be used for entirely legal purposes – or not, depending on the choice of the user.

In other words, it’s a tool. Now, the entertainment industry has a long and storied history of pretending that tools that have perfectly legitimate uses are the world’s greatest devils and somehow themselves infringe copyright. This goes back to the Betamax, and likely before that. But this particular case is one that ought to have the attention of a great many software providers out there, if not hardware providers as well. As the TorrentFreak post notes, if Perfect Player is infringing, why isn’t Windows Media Player? They have the exact same capabilities. And, taken a step further, if Perfect Player is infringing because users can use it to infringe copyright, then why aren’t android phones themselves infringing?

Is that line of thought extreme and ridiculous? Of course it is, but it’s built off of the same ridiculous line of thinking as whoever complained about Perfect Player. TorrentFreak is rather charitable in positing that perhaps this TV company came across a version of Perfect Player that had already been loaded with pirate IPTV streams and is simply confused.

Giving the TV company the benefit of the doubt for a moment, it’s not beyond the realms of possibility that it acquired a ready-configured copy of Perfect Player from a third-party that already contained a URL for a ‘pirate’ service. That could give the impression it’s a dedicated pirate app.

That being said, downloading a copy from Google Play would’ve highlighted the important differences between a non-configured player and one set up for piracy. That’s impossible now, of course, because Google has taken Perfect Player down.

The latest at the time of this writing is that Perfect Player will be filing a DMCA counternotice, having retained a lawyer. One hopes that some simple facts about what this app is and how it operates out of the box will be all that Google needs to get it relisted quickly. And maybe, just maybe, one TV industry player will learn a lesson about firing off DMCA notices without actually knowing what its talking about.

Permalink | Comments | Email This Story

Techdirt.

Though ransomware persists in government — often unreported — experts say things are looking up

  1. Though ransomware persists in government — often unreported — experts say things are looking up  StateScoop
  2. Full coverage

Ransomware – read more

Mikishima Confirms ‘Super Mario Run’ Android Version Release in 2017; Still Not a Totally Free Mobile Game Though – Mobile & Apps


Mobile & Apps

Mikishima Confirms 'Super Mario Run' Android Version Release in 2017; Still Not a Totally Free Mobile Game Though
Mobile & Apps
At any rate, Nintendo seems to be able to place everything within desirable Android security atmosphere. It is no less than company president Takeshi Mikishima himself that confirmed "Super Mario Run" coming soon in an interview with Kyoto-NP. Finally …

and more »

android security – read more

US will still push for encryption workarounds, even though iPhone hearing was postponed

Don’t expect the U.S. government to back off its push for technology vendors to build encryption workarounds into their products, even though the FBI acknowledged it may have a way to crack into an iPhone used in the San Bernardino, California, mass shooting case.

Some lawmakers and President Barack Obama’s administration will continue to look for ways to compel tech vendors to help law enforcement agencies defeat encryption and other security controls on smartphones and other devices, security and legal experts said.

Even if the FBI can break into the iPhone used by San Bernardino mass shooter Syed Rizwan Farook, it doesn’t significantly change the larger discussion about encryption, said Ed Black, president and CEO of trade group the Computer and Communications Industry Association. “There is an ongoing effort by our government and every government around the world … to want more information.”

To read this article in full or to leave a comment, please click here

Network World Security