Daily Archives: 2020-02-26

Cursed Adapters

Source: Hacker News

Article note: I, horrifyingly, can come up with interesting uses for most of those.
Comments
Posted in News | Leave a comment

A pair of musicians recorded every possible MIDI melody just to get around copyright law

Source: Boing Boing

Article note: This. Is. Glorious! I've shit-talked about doing it for images (making a program that iterates through all [X]x[Y]x[Color Depth] images in some sort of sequence, maybe as a desktop widget and maybe as one of those LED grids for exactly the same reasons.

Motherboard has an interesting new piece about musical copyright law, and the fact that there are only so many musical sequences using half-step frequencies possible. What happens when they're all used up, and the copyright trolls take everyone to court for any song that even remotely resembles another one, just by virtue of the fact that it relies on the same music theory?

Think about Lana Del Rey accidentally ripping off of Radiohead, who had accidentally ripped off of the Hollies. It's not crazy to write a song that goes from the I to the extra tension of a Chromatic Mediant III before resolving on a IV, which then walks down to a minor iv and returns to the tonic.

(Or, in simpler terms, as Motherboard puts it: Sam Smith's "Stay With Me" ripping off of Tom Petty's "Won't Back Down")

To get around the potential future copyright trolls, Damien Riehl and Noah Rubin developed a MIDI algorithm to automatically generate a series of melodies, then released those datasets into the public domain using a Creative Commons Zero license. The method for achieving this is pretty neat:

To determine the finite nature of melodies, Riehl and Rubin developed an algorithm that recorded every possible 8-note, 12-beat melody combo. This used the same basic tactic some hackers use to guess passwords: Churning through every possible combination of notes until none remained. Riehl says this algorithm works at a rate of 300,000 melodies per second.

Once a work is committed to a tangible format, it's considered copyrighted. And in MIDI format, notes are just numbers.

"Under copyright law, numbers are facts, and under copyright law, facts either have thin copyright, almost no copyright, or no copyright at all," Riehl explained in the talk. "So maybe if these numbers have existed since the beginning of time and we're just plucking them out, maybe melodies are just math, which is just facts, which is not copyrightable."

Ideally, this would mean that any new music that gets written is arguably remixing and adapting from these public domain melodies … which means there's no copyright infringement, just new songs. Though whether this holds up in court remains to be seen.

Musicians Algorithmically Generate Every Possible Melody, Release Them to Public Domain [Samantha Cole / Vice]

Image: AidenIreland / Wikimedia Commons (CC 4.0)

Posted in News | Leave a comment

Clarence Thomas regrets ruling that Ajit Pai used to kill net neutrality

Source: Ars Technica

Article note: Uh-Oh, you voted for some of the courts' power to be vacated into administrative agencies experiencing regulatory capture, and now you regret it?
Six Supreme Court justices pose for an official group photo.

Enlarge / US Supreme Court justices sit for their official group photo on Friday, Nov. 30, 2018 in Washington, DC. Seated from left, Associate Justice Stephen Breyer, Associate Justice Clarence Thomas, and Chief Justice of the United States John Roberts. Standing from left, Associate Justice Neil Gorsuch, Associate Justice Sonia Sotomayor, and Associate Justice Elena Kagan. (credit: Getty Images | The Washington Post)

Supreme Court Justice Clarence Thomas wants a do-over on his 2005 decision in a case that had a major impact on the power of federal agencies and regulation of the broadband industry.

In National Cable & Telecommunications Association v. Brand X Internet Services, better known as Brand X, Thomas wrote the 6-3 majority opinion that upheld a Federal Communications Commission decision to classify cable broadband as an information service. But in a dissent on a new case, released Monday, Thomas wrote that he got Brand X wrong. Thomas regrets that Brand X gave federal agencies extensive power to interpret US law, a power generally reserved for judges.

"Regrettably, Brand X has taken this Court to the precipice of administrative absolutism," Thomas wrote. "Under its rule of deference, agencies are free to invent new (purported) interpretations of statutes and then require courts to reject their own prior interpretations."

Read 26 remaining paragraphs | Comments

Posted in News | Leave a comment

Newly Declassified Study Demonstrates Uselessness of NSA’s Phone Metadata Program

Source: Schneier on Security

Article note: So, the illegally invasive and extremely expensive program was also _useless_? What a surprise. /s Can we have congress not extend the unconstitutional authority (by declining to renew, fuck's sake, the "FREEDOM Act"), then get on a roll and gut some others, like the TSA?

The New York Times is reporting on the NSA's phone metadata program, which the NSA shut down last year:

A National Security Agency system that analyzed logs of Americans' domestic phone calls and text messages cost $100 million from 2015 to 2019, but yielded only a single significant investigation, according to a newly declassified study.

Moreover, only twice during that four-year period did the program generate unique information that the F.B.I. did not already possess, said the study, which was produced by the Privacy and Civil Liberties Oversight Board and briefed to Congress on Tuesday.

[...]

The privacy board, working with the intelligence community, got several additional salient facts declassified as part of the rollout of its report. Among them, it officially disclosed that the system has gained access to Americans' cellphone records, not just logs of landline phone calls.

It also disclosed that in the four years the Freedom Act system was operational, the National Security Agency produced 15 intelligence reports derived from it. The other 13, however, contained information the F.B.I. had already collected through other means, like ordinary subpoenas to telephone companies.

The report cited two investigations in which the National Security Agency produced reports derived from the program: its analysis of the Pulse nightclub mass shooting in Orlando, Fla., in June 2016 and of the November 2016 attack at Ohio State University by a man who drove his car into people and slashed at them with a machete. But it did not say whether the investigations into either of those attacks were connected to the two intelligence reports that provided unique information not already in the possession of the F.B.I.

This program is legal due to the USA FREEDOM Act, which expires on March 15. Congress is currently debating whether to extend the authority, even though the NSA says it's not using it now.

Posted in News | Leave a comment