In one week, an EU committee will vote on a pair of extreme copyright proposals that will ban linking to news articles without permission, and force internet platforms to spy on all the pictures, text, video, audio and code their users post, sending it to AIs designed to catch copyright infringement and automatically censor anything that might violate copyright.
This is literally the worst internet proposal I’ve seen outside of China/North Korea/Iran, and if the committee votes in favour of it, the European Parliament is extremely likely to pass it into the law of 28 countries.
A group of more than 70 “internet luminaries” — from TCP co-inventor Vint Cerf and web inventor Tim Berners-Lee to Bruce Schneier to Apache creator Brian Behlendorf to Wikipedia founder Jimmy Wales to Mozilla chairman Mitchell Baker and many more — have signed an open letter to the President of the European Parliament, warning that the proposal “takes an unprecedented step towards the transformation of the Internet from an open platform for sharing and innovation, into a tool for the automated surveillance and control of its users.”
If you’re a European, you have one week to contact your MEP!
In particular, far from only affecting large American Internet platforms (who can well afford the costs of
compliance), the burden of Article 13 will fall most heavily on their competitors, including European
startups and SMEs. The cost of putting in place the necessary automatic filtering technologies will be
expensive and burdensome, and yet those technologies have still not developed to a point where their
reliability can be guaranteed.Indeed, if Article 13 had been in place when Internet’s core protocols and
applications were developed, it is unlikely that it would exist today as we know it.
The impact of Article 13 would also fall heavily on ordinary users of Internet platforms—not only those
who upload music or video (frequently in reliance upon copyright limitations and exceptions, that
Article 13 ignores), but even those who contribute photos, text, or computer code to open collaboration
platforms such as Wikipedia and GitHub.
Letter to Antonio Tajani MEP [Vint Cerf, Tim Berners-Lee, et al]
Vint Cerf, Tim Berners-Lee, and Dozens of Other Computing Experts Oppose Article 13 [Danny O’Brien and Jeremy Malcolm/EFF Deeplinks]
Håkon Wium Lie has many claims to fame — he not only created Cascading Style Sheets, an integral part of the web, but he also was the first person to publish the laws of Norway (which are public domain, but were behind a $1/minute paywall at the time) for free, online. Though the company that […]
Back in 2010, I linked to a superb infographic showing all the ways that official DVDs were worse than their pirate equivalents (unskippable ads and FBI warnings, etc); now Dnd01 has updated the graphic with a version highlighting all the ways that the games industry has encrufted their products with DRM that make them into […]
Muso is a London-based anti-piracy contractor, helping big entertainment companies conduct surveillance and legal threats against online infringers; in a new CitizenMe study they commissioned, 1,000 British internet users were surveyed; the headline finding: 83% of infringing downloads are triggered by an unsuccessful search for a commercially available version of the same work.
From your apartment door to your bike lock, it’s not uncommon to carry a number of different keys on your keyring, but that doesn’t make it any more bearable when you’re fussing to find the right one or deal with the infamous pocket bulge. The KeySmart Pro’s smart design cuts down on key clutter and […]
You have a right to privacy, but whether or not it’s respected online is a different story. With hackers, shady third-party companies, and the government prowling the web for personal information, you can’t be too careful when it comes to protecting yourself online. VPNs have emerged as a popular solution, but not all are created […]
It might sound counterintuitive, but one of the best ways to bring down a hacker is with another hacker. Commonly known as “white hats,” or ethical hackers, these professionals use a cybercriminal’s tools against them, sniffing out network vulnerabilities and patching them up before they can be exploited. In today’s heightened cybersecurity climate, demand for […]