Interesting Digital Sharing Dilemma

AI Thread Summary
The discussion centers on the legal implications of using public key encryption to manipulate copyrighted material. It presents a scenario where a copyrighted file is XORed with a public domain file to create a new file. The key question raised is whether distributing this new file is legal, considering it can be used to reconstruct the original copyrighted file if both the new file and the public domain file are available. The conversation explores whether copyright holders can claim ownership over the resulting bit sequences and the XOR operation itself. It draws parallels to other forms of encryption and compression, questioning the legality of distributing files that can be decrypted or decompressed to reveal copyrighted content. The discussion highlights the complexities of copyright law in the context of digital file manipulation and encryption techniques.
dduardo
Staff Emeritus
Science Advisor
Insights Author
Messages
1,902
Reaction score
3
This project brings up an interesting legal dilemma with basic public key encryption and sharing digital copyrighted material:

http://monolith.sourceforge.net/

----------
Here is the basic gist:


Let's say I have a copyrighted file that is represented by the following bit sequence:

Bob's Copyrighted File: 10100010001

I also have a file in the public domain with the following bit sequence:

Public Domain File: 11011001010

If I where to distribute this public domain file on the internet, I could without any legal repercussions.

Now let's say I XOR the public domain file with Bob's file such that I get a third file:

My 3rd File: 01111011011

Would it be legal for me to distribute this 3rd file to people on the internet since this 3rd file isn't bob's copyrighted file?

The neat thing about this algorithm is that if you get a hold of both the public domain file and the 3rd file and XOR them you get Bob's copyrighted file.

Depending on the public domain file you could in theory generate an infinite number of 3rd files. Does the copyright holder own all these different bit sequences? Does the copyright holder own the XOR operator?
 
Computer science news on Phys.org
This is just an encryption scheme -- it would surprise me if this is anything new.
 
I know it is encryption and I know it's not new. I just thought it would be interesting to find out peoples' opinions on distributing the 3rd file.
 
I guess I just don't see how this is any different than putting the file in a windows encrypted folder and distributing that... or even just gzipping it and distributing that!

Am I reading too much into the fact that you chose to link to this particular project?
 
Thread 'ChatGPT Examples, Good and Bad'
I've been experimenting with ChatGPT. Some results are good, some very very bad. I think examples can help expose the properties of this AI. Maybe you can post some of your favorite examples and tell us what they reveal about the properties of this AI. (I had problems with copy/paste of text and formatting, so I'm posting my examples as screen shots. That is a promising start. :smile: But then I provided values V=1, R1=1, R2=2, R3=3 and asked for the value of I. At first, it said...
Sorry if 'Profile Badge' is not the correct term. I have an MS 365 subscription and I've noticed on my Word documents the small circle with my initials in it is sometimes different in colour document to document (it's the circle at the top right of the doc, that, when you hover over it it tells you you're signed in; if you click on it you get a bit more info). Last night I had four docs with a red circle, one with blue. When I closed the blue and opened it again it was red. Today I have 3...
Back
Top