Defending Access to the Decentralized Web

Decentralized web technologies have the potential to make the internet more robust and efficient, supporting a new wave of innovation.
The fundamental technologies and services that make it work are already being hit with overreaching legal threats.
Using the hash, a machine then learns where to request the file from, and then retrieves it in pieces from those locations.
IPFS gateways in particular perform these functions on behalf of a user who tells it what hash to retrieve the file for.
It's a conduit, like a traditional proxy server, virtual private network, or ISP. Our client, computer scientist Mike Damm, offers a free IPFS gateway.
He doesn't control how people user it or what files they access.
A company called Jetbrains insists that that Mr. Damm could be liable under Section 1201 of the Digital Millennium Copyright Act because JetBrains' lawyers are allegedly able to use his gateway to request and retrieve software keys for Jetbrains software from the IPFS network.
We were glad to have the opportunity to set them straight.
Section 1201 is a terrible law, but it doesn't impose liability on a general-purpose conduit for information.
First, a conduit does not fall into any of the three categories of trafficking under Section 1201: its primary purpose is not circumvention, it has extensive other uses, and it is not marketed for circumvention.
Second, Congress has expressly recognized the need to protect conduits from legal risk given their crucial role in supporting the basic functioning of the internet.
In Section 512(a) of the DMCA, Congress singled out conduits to receive the highest level of safe harbor protection, recognizing that the ability to dispose of copyright claims at an early stage of litigation was crucial to the operation of these services.
It would be absurd to suggest that Congress granted conduits special immunity for copyright claims based on third party activity but then, in the same statute, made them liable for pseudo-copyright Section 1201 claims.
The DMCA has serious flaws, but one thing Congress got right was protecting basic infrastructure providers from being liable for the way that third parties choose to use them.
This is in line with longstanding legal principles whereby courts require plaintiffs to target their complaints towards the individuals choosing to misuse general-purpose services, rather than assigning blame to service providers.
Deviating from this rule could have extinguished the internet in its infancy and threatens to do the same with new information technologies.


This Cyber News was published on www.eff.org. Publication date: Tue, 20 Feb 2024 20:43:05 +0000


Cyber News related to Defending Access to the Decentralized Web

Exploring the Phenomenal Rise of Ethereum as a Digital Asset - In this exploration, we delve into the multifaceted layers of Ethereum's meteoric rise, dissecting the technological breakthroughs, the vibrant community dynamics, and the pivotal moments that have propelled it to the forefront of the digital asset ...
11 months ago Hackread.com
Taking Back the Web with Decentralization: 2023 in Review - In the past few years, there's been an accelerating swing back toward decentralization. Users are fed up with the concentration of power, and the prevalence of privacy and free expression violations, and many users are fleeing to smaller, ...
1 year ago Eff.org
Embracing a Passwordless Future: Navigating the Shift to Decentralized Security in 2024 - The world has swiftly embraced digitalization, empowering individuals to accomplish over 90% of their daily tasks through mobile apps or web interfaces. Activities like bill payments, flight bookings, health consultations, and even exploring one's ...
1 year ago Cysecurity.news
Exploring Blockchain's Revolutionary Impact on E-Commerce - The trend of choosing online shopping over traditional in-store visits is on the rise, with e-commerce transactions dominating the digital landscape. Blockchain technology emerges as a solution to bolster the security of online transactions. ...
1 year ago Cysecurity.news
When a Data Mesh Doesn't Make Sense - The data mesh is a thoughtful decentralized approach that facilitates the creation of domain-driven, self-service data products. Data mesh-including data mesh governance-requires the right mix of process, tooling, and internal resources to be ...
10 months ago Feeds.dzone.com
Hackers Exploiting Crypto Liquidity Pools to Execute Trades - Crypto pool liquidity is the total assets locked in a decentralized finance liquidity pool. Hackers manipulate the pool liquidity to create artificial imbalances that allow them to control prices and execute profitable trades. Cybersecurity ...
1 year ago Cybersecuritynews.com
North Korean Hackers' $12M Ethereum Laundering Via Tornado Cash Unveiled - It has been reported that North Korean hackers associated with the Lazarus Group have exploited Tornado Cash in a recent development to launder approximately $12 million worth of stolen Ethereum in the last 24 hours, using the coin mix-up service ...
10 months ago Cysecurity.news
Defending Access to the Decentralized Web - Decentralized web technologies have the potential to make the internet more robust and efficient, supporting a new wave of innovation. The fundamental technologies and services that make it work are already being hit with overreaching legal threats. ...
11 months ago Eff.org
French government recommends against using foreign chat apps - Prime Minister of France Élisabeth Borne signed a circular last week requesting all government employees to uninstall foreign communication apps such as Signal, WhatsApp, and Telegram by December 8, 2023, in favor of a French messaging app named ...
1 year ago Bleepingcomputer.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Vectra AI Launches Global, 24x7 Open MXDR Service Built to Defend Against Hybrid Attacks - PRESS RELEASE. San Jose, Calif. - February 15, 2024 - Vectra AI, Inc., the leader in hybrid attack detection, investigation and response, today announced the launch of Vectra MXDR services, the industry's first global, 24x7 open MXDR service built to ...
11 months ago Darkreading.com
Are Security Appliances fit for Purpose in a Decentralized Workplace? - Security appliances have been traditionally considered one of the most effective forms of perimeter security. Today, security appliances feature amongst the most riskiest enterprise devices and are a preferred method for threat actors to infiltrate a ...
1 year ago Securityweek.com
What the Future Holds for Data Security - Data security refers to protective measures used to prevent unauthorized access to sensitive personal and business data. Data security is not just about keeping hackers at bay. It also covers practices like data encryption, data masking, data loss ...
1 year ago Securityboulevard.com
5 ways to secure identity and access for 2024 - 1 This increase is due in part to the rise of generative AI and large language models, which bring new opportunities and challenges for security professionals while affecting what we must do to secure access effectively. Learn how unified multicloud ...
1 year ago Microsoft.com
The Fake Browser Update Scam Gets a Makeover - One of the oldest malware tricks in the book - hacked websites claiming visitors need to update their Web browser before they can view any content - has roared back to life in the past few months. New research shows the attackers behind one such ...
1 year ago Krebsonsecurity.com
Russian admits building now-dismantled IPStorm proxy botnet The Register - The FBI says it has dismantled another botnet after collaring its operator, who admitted hijacking tens of thousands of machines around the world to create his network of obedient nodes. Sergei Makinin, a Russian and Moldovan national, was cuffed in ...
1 year ago Theregister.com
Exploring the Digital World in 2023 - Web3 is the future of the internet, and it is being claimed that it is the future today. We will look at the characteristics of web3, such as decentralization and the metaverse, and how they will shape the future. One of the components of web3 is ...
1 year ago Securityweek.com
Crypto Deception Unveiled: Check Point Research Reports Manipulation of Pool Liquidity Skyrockets Token Price by 22,000% - Deceptive actors are manipulating pool liquidity, sending token prices soaring by a shocking 22,000%. 80,000 Heist Unveiled: The manipulation of pool liquidity resulted in a swift and calculated theft of $80,000 from unsuspecting token holders. Check ...
1 year ago Blog.checkpoint.com
Panther Labs introduces Security Data Lake Search and Splunk Integration capabilities - These offerings mark a critical leap forward in managing security risks in today's cloud-first landscape. As organizations race to implement machine learning capabilities, they're increasingly reliant on decentralized, cloud-based data stores and ...
1 year ago Helpnetsecurity.com
Edge Computing: Data and Connectivity - Edge computing is a distributed computing model that brings processing capabilities closer to the data source, be it IoT devices, sensors, or end-user devices, rather than relying on centralized data centers. By decentralizing data processing, edge ...
1 year ago Feeds.dzone.com
NY engineer pleads guilty to stealing millions from two crypto exchanges - A former security engineer for an international tech company pleaded guilty in federal court to hacking two decentralized cryptocurrency exchanges. As a result of these hacks in July 2022, U.S. citizen Shakeeb Ahmed, 34, illegally obtained over $12 ...
1 year ago Therecord.media
Ex-Amazon engineer pleads guilty to hacking crypto exchanges - Former Amazon security engineer Shakeeb Ahmed pleaded guilty this week to hacking and stealing over $12.3 million from two cryptocurrency exchanges in July 2022. The two affected companies are Nirvana Finance, a decentralized crypto exchange, and an ...
1 year ago Bleepingcomputer.com
Learning To Use Web3: First Impressions - Come along with me as I learn about blockchain and web3: the good, the bad, why it's needed, how to learn it, and, in the end, if it's really what it's hyped up to be. Web3's potential to transform how businesses transact and perform merits ...
1 year ago Feeds.dzone.com
Cyber-Attacks Drain $1.84bn from Web3 in 2023 - Cyber-attacks targeting Web3 cost organizations $1.84bn in 2023 across 751 incidents, according to Certik's Hack3d: The Web3 Security Report 2023. The average cost per incident was $2.45m in 2023. There was a wide disparity between the losses ...
1 year ago Infosecurity-magazine.com
6 Ransomware Trends & Evolutions For 2023 - More than any other industry, cybersecurity is constantly changing. The number of major paradigm shifts that have transformed the world of cybersecurity in the past few years has been unprecedented, especially when it comes to combating ransomware. ...
1 year ago Trendmicro.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)