Connect with us

The court removed responsibility for counterfeit content on its CDN from Cloudflare

Published

on

US clothing retailers have sued Cloudflare for providing technical assistance to sites with fake goods.

Cloudflare shall not be held responsible for any copyright infringement that occurs on sites on its Content Delivery Network (CDN). Such a decision this week accepted federal judge in the United States.

The troubles began in 2018 when San Francisco-based wedding and evening gown sellers Mon Cheri Bridals and Maggie Sottero Designs faced online scammers copying their models and selling copies of their outfits online. As soon as the copyright holders tried to close the sites with copies of their dresses, new ones immediately appeared. As a result, the sellers found the last one and accused Cloudflare of providing technical support to the scammers.

“Cloudflare contributes to, and therefore enables, these counterfeit sites to successfully defraud consumers and infringe on the copyrights of plaintiffs and other clothing manufacturers,” the court said. claim against Cloudflare.

However, Vince Chhabria, a federal judge for the Northern District of California, disagreed with the plaintiffs and dismissed their complaint.

“Plaintiffs have not provided evidence on which a jury could conclude that Cloudflare’s performance improvement services have materially contributed to copyright infringement. The only evidence provided by the plaintiffs for the effectiveness of these services is advertising material from the Cloudflare website advertising the benefits of the services.” said the judge.

“We do not host content on these sites, do not aggregate or promote or help users find it, and our services do not even make content available online. Infrastructure providers like Cloudflare are unable to address issues such as copyright infringement in internet […] We agree with the arguments of the district court and hope that this will help prevent similar claims in the future, “- said in Cloudflare.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Security

Chinese TikTok adds 5-second pauses between videos to combat addictions

Published

on

5-second warning clips will remind you to “put the phone away” or “go to bed”.

Douyin, the Chinese app “twin” of TikTok, owned by the same ByteDance company, is introducing measures to combat its own algorithms, tuned to keep users’ attention as long as possible. Now those who “stick” in the application for too long will be revived by forced pauses between clips. Reported by the South China Morning Post.

On the social network, there are five-second pauses between videos that cannot be missed. During such pauses, users will be forced to watch videos reminding them of the need to “put the phone away”, “go to bed” or that “work tomorrow”. They will appear when the user spends too much time in the application.

Previously, Douyin had already limited video viewing – then the changes affected the children’s audience. Teenagers under 14 were allowed to watch videos for a maximum of 40 minutes a day, and were also banned from entering the application from 10 pm to 6 am.

Continue Reading

Security

Trump’s social network developers accused of illegal use of program code

Published

on

The Software Freedom Conservancy claims Trump Media and Technology Group copied the open source code of the decentralized social network Mastodon, created a new social network based on it.

The Software Freedom Conservancy (SFC), a not-for-profit organization that enforces the rights of open source software developers and the rules for using open licenses, accused in violation of the AGPLv3 license of the Trump social network developers Truth Social.

The Software Freedom Conservancy says that the developers of the service used the open source code of the decentralized social network Mastodon in violation of the license agreement.

Although the Mastodon code is free and free, the projects using it must comply with the terms of the Affero General Public License (or AGPLv3), among which is the mandatory availability of the project source code for all its users. Trump’s media company does not yet provide such an opportunity to TRUTH Social users and calls the social network a proprietary development.

The Software Freedom Conservancy gave Trump Media and Technology Group 30 days to improve, writes The Verge. Otherwise, the use of open source Mastodon will be prohibited for the company.

Continue Reading

Security

Facebook end-to-end encryption will give foreign intelligence services surveillance capabilities

Published

on

Former Facebook employee Frances Haugen criticized the company’s decision to transfer correspondence in its services to end-to-end encryption.

The introduction of end-to-end encryption in Facebook messengers could negatively affect the privacy of users and lead to increased surveillance by intelligence agencies. This opinion was expressed by a former employee of Mark Zuckerberg’s company, Frances Haugen, reports TASS.

According to her, after the launch of encryption in the Messenger application and the social network Instagram, which are owned by Facebook, the company will lose the ability to track possible “malicious operations of special services representatives.” “End-to-End Encryption Will Allow Facebook to Eliminate [от модерирования контента] and serve as an excuse for inaction, “Haugen said ahead of her October 25 speech in the British Parliament as part of discussions on online security bill.

The social network itself does not agree with this point of view. In their opinion, the introduction of end-to-end encryption in Facebook Messenger and Instagram applications, on the contrary, is aimed primarily at protecting the privacy of users and will protect them not only from foreign surveillance, but also from hackers.

Continue Reading

Most Popular