Editing 344: 1337: Part 4

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 19: Line 19:
 
In this part, [[Help I'm trapped in a driver's license factory Elaine Roberts]] returns to the second-best hacker in the world (she is the best, according to [[342: 1337: Part 2]]): her mom [[Mrs. Roberts]]. Together, they are an unstoppable force, and they help out a guy called Jon with a CSS decryptor ({{w|Content Scramble System}}, not to be confused with Cascading Style Sheets).
 
In this part, [[Help I'm trapped in a driver's license factory Elaine Roberts]] returns to the second-best hacker in the world (she is the best, according to [[342: 1337: Part 2]]): her mom [[Mrs. Roberts]]. Together, they are an unstoppable force, and they help out a guy called Jon with a CSS decryptor ({{w|Content Scramble System}}, not to be confused with Cascading Style Sheets).
  
βˆ’
This implies that {{w|Jon Lech Johansen}}'s DeCSS was written by Elaine. Jon Lech Johansen, also known as DVD Jon, is famous for {{w|DeCSS}}, a DVD decryption program that removes the copy obstruction from commercial DVDs. The {{w|Motion Picture Association of America}}, also known as the MPAA, was not amused.  
+
This implies that {{w|Jon Lech Johansen}}'s DeCSS was written by Elaine. Jon Lech Johansen, also known as DVD Jon, is famous for {{w|DeCSS}}, a DVD decryption program that removes the copy protection from commercial DVDs. The {{w|Motion Picture Association of America}}, also known as the MPAA, was not amused.  
  
βˆ’
Both the MPAA and the {{w|Recording Industry Association of America}} (RIAA) use the {{w|Digital Millennium Copyright Act}}, shortened to DMCA, as a kind of brute club to silence "infringements" on their copyright. In a perfect world, the DMCA provides safe harbor protection to websites and consumers to make fair use of copyrighted content, while also affording copyright owners the ability to protect their works from being pirated. In this world, this means that any content restriction system, no matter how weak and poorly executed, cannot be circumvented, and discussion of circumvention is illegal as well.
+
Both the MPAA and the {{w|Recording Industry Association of America}} (RIAA) use the {{w|Digital Millennium Copyright Act}}, shortened to DMCA, as a kind of brute club to silence "infringements" on their copyright. In a perfect world, the DMCA provides safe harbor protection to websites and consumers to make fair use of copyrighted content, while also affording copyright owners the ability to protect their works from being pirated. In this world, this means that any content protection system, no matter how weak and poorly executed, cannot be circumvented, and discussion of circumvention is illegal as well.
  
 
This is not a perfect world,{{cn}} and in the end, the Roberts team is noticed. Two men with black bowler hats and briefcases with the abbreviations MPAA and RIAA show up at their house to arrest them. The two men look very much like {{w|Thomson and Thompson}} from {{w|The Adventures of Tintin}}, who are (bumbling) policemen/detectives who do not usually attempt violence or wield weapons more dangerous than a standard furled umbrella, but here it more likely depicts the {{tvtropes|NebulousEvilOrganization|Nebulous Evil Organization}}'s corporate variation upon the Men In Black.
 
This is not a perfect world,{{cn}} and in the end, the Roberts team is noticed. Two men with black bowler hats and briefcases with the abbreviations MPAA and RIAA show up at their house to arrest them. The two men look very much like {{w|Thomson and Thompson}} from {{w|The Adventures of Tintin}}, who are (bumbling) policemen/detectives who do not usually attempt violence or wield weapons more dangerous than a standard furled umbrella, but here it more likely depicts the {{tvtropes|NebulousEvilOrganization|Nebulous Evil Organization}}'s corporate variation upon the Men In Black.
Line 31: Line 31:
 
But of course, [[Richard Stallman]], founder of the {{w|GNU Project}} and stalwart defender of freedom and {{w|copyleft}}, cannot stand for this kind of repression of freedom. (In the real world, Stallman is not a swordsman, but he is always depicted with two katana swords in xkcd, first time was in [[225: Open Source]].) In keeping with the "{{w|Kill Bill}}" themes from earlier in the series, [[Randall]] imagines the conflict between Elaine/Stallman/Mrs. Roberts vs MPAA/RIAA agents as an action-packed katana battle, rather than the legal battle it would likely have been in real life.
 
But of course, [[Richard Stallman]], founder of the {{w|GNU Project}} and stalwart defender of freedom and {{w|copyleft}}, cannot stand for this kind of repression of freedom. (In the real world, Stallman is not a swordsman, but he is always depicted with two katana swords in xkcd, first time was in [[225: Open Source]].) In keeping with the "{{w|Kill Bill}}" themes from earlier in the series, [[Randall]] imagines the conflict between Elaine/Stallman/Mrs. Roberts vs MPAA/RIAA agents as an action-packed katana battle, rather than the legal battle it would likely have been in real life.
  
βˆ’
The title text is talking about a {{w|Linux}}-ism. In GNU/Linux (and all Unix derivatives), ~ is a symbol for a user's home directory (usually <code>/home/<username></code>). Presumably, "nomad" is Elaine's username. <code>find</code> is an application that recursively walks a filesystem, listing all files, and <code>xargs shred</code> takes those files and securely erases each one with pseudo-random data. This is different from simply deleting a file, which merely removes the pointer in the filesystem's record tables to the file's location on the hard disk. The latter can usually be recovered from. Secure delete, however, requires physically taking apart a disk and reading individual bits for remaining magnetic charge to attempt to reconstruct what was there. This means she was trying to permanently delete her and Elaine's files, presumably so the agents wouldn't have any proof of their hacking.
+
The title text is talking about a {{w|Linux}}-ism. In Linux (and all Unix derivatives), ~ is a symbol for a user's home directory (usually <code>/home/<username></code>). Presumably, "nomad" is Elaine's username. <code>find</code> is an application that recursively walks a filesystem, listing all files, and <code>xargs shred</code> takes those files and securely erases each one with pseudo-random data. This is different from simply deleting a file, which merely removes the pointer in the filesystem's record tables to the file's location on the hard disk. The latter can usually be recovered from. Secure delete, however, requires physically taking apart a disk and reading individual bits for remaining magnetic charge to attempt to reconstruct what was there. This means she was trying to permanently delete her and Elaine's files, presumably so the agents wouldn't have any proof of their hacking.
  
 
Proprietary hardware is hardware (the electronics part rather than the software) created and used only by that company, as opposed to open hardware, which uses parts or chips common to everyone. Proprietary hardware used to be found in most gaming consoles and Apple/Mac devices, but that isn't as common now, since the cost of designing your own hardware is too expensive compared to using common chips.
 
Proprietary hardware is hardware (the electronics part rather than the software) created and used only by that company, as opposed to open hardware, which uses parts or chips common to everyone. Proprietary hardware used to be found in most gaming consoles and Apple/Mac devices, but that isn't as common now, since the cost of designing your own hardware is too expensive compared to using common chips.

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)