Stories
Slash Boxes
Comments

SoylentNews is people

posted by cmn32480 on Friday May 19 2017, @04:48PM   Printer-friendly
from the you-reap-what-you-sow dept.

Submitted via IRC for TheMightyBuzzard

Two years ago, academic publisher Elsevier filed a complaint against Sci-Hub, Libgen and several related "pirate" sites.

The publisher accused the websites of making academic papers widely available to the public, without permission.

While Sci-Hub and Libgen are nothing like the average pirate site, they are just as illegal according to Elsevier's legal team, which swiftly obtained a preliminary injunction from a New York District Court.

The injunction ordered Sci-Hub's founder Alexandra Elbakyan, who is the only named defendant, to quit offering access to any Elsevier content. This didn't happen, however.

Sci-Hub and the other websites lost control over several domain names, but were quick to bounce back. They remain operational today and have no intention of shutting down, despite pressure from the Court.

This prompted Elsevier to request a default judgment and a permanent injunction against the Sci-Hub and Libgen defendants. In a motion filed this week, Elsevier's legal team describes the sites as pirate havens.

Source: https://torrentfreak.com/elsevier-wants-15-million-piracy-damages-from-sci-hub-and-libgen-170518/

Previously:
The Research Pirates of the Dark Web
New York Times Opinion Piece on Open Access Publishing
A Spiritual Successor to Aaron Swartz is Angering Publishers All Over Again


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by edIII on Friday May 19 2017, @09:17PM (2 children)

    by edIII (791) on Friday May 19 2017, @09:17PM (#512380)

    That's an extremely good question. Although there is a theory that AES might not be vulnerable after all. Meaning that AES can scale faster than quantum computers can scale, and at much cheaper costs.

    It may be better to move to purely anonymous forms of mass communication. Maintainers (IT) are not necessary. Design the system from the beginning to be a small device, that can be hidden surreptitiously, for users to access data. In order to access the data at all you must be contributing to the system in a decentralized anonymous peering network.

    That is most likely "immune" to quantum attacks IF the devices have their "last mile" as wireless. Even better with mesh networks that can have users at low bandwidth communicating for 10-15 miles easy. Whether or not quantum attacks succeed, it will be exceedingly difficult to name these people in a lawsuit. The FCC (remember Pump Up The Volume?) would need to track down the devices with triangulation, and you would need an expert testifying for each person to prove relationships between users and devices.

    The final step is using wireless steering technologies to connect with multiple other peers at the 10-15 mile range, randomly load balance across them, and have the "router" devices attached to a drone :)

    If a quantum attack against the block chain is possible, then it also stands to reason that almost all other forms of cryptographic signatures are vulnerable to. In that case, the only answer is quantum devices that use quantum principles to lock information into a "domain" that can only be accessed with specific attributes of the user. Unfortunately, I don't even know of any that are theorized, much less their abilities to perform key exchange and transmit attributes to other users remotely.

    Yeah, quantum encryption and vaults are the only answer to quantum cryptanalysis performed against traditional public key and block chain technologies.

    --
    Technically, lunchtime is at any moment. It's just a wave function.
    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 3, Interesting) by urza9814 on Saturday May 20 2017, @02:29AM (1 child)

    by urza9814 (3954) on Saturday May 20 2017, @02:29AM (#512490) Journal

    If a quantum attack against the block chain is possible, then it also stands to reason that almost all other forms of cryptographic signatures are vulnerable to. In that case, the only answer is quantum devices that use quantum principles to lock information into a "domain" that can only be accessed with specific attributes of the user. Unfortunately, I don't even know of any that are theorized, much less their abilities to perform key exchange and transmit attributes to other users remotely.

    No, there's classical public-key encryption methods that should be able to resist quantum attacks.

    Many such approaches are listed on the Wikipedia page for Post-quantum cryptography:
    https://en.wikipedia.org/wiki/Post-quantum_cryptography [wikipedia.org]

    And there's open source tools to do it:
    https://github.com/exaexa/codecrypt [github.com]

    So yes, most current algorithms are probably vulnerable, but we can fix that without needing full quantum encryption tech. Which is great news since the bad guys are probably gonna have quantum computers long before we do...

    • (Score: 2) by edIII on Saturday May 20 2017, @05:26AM

      by edIII (791) on Saturday May 20 2017, @05:26AM (#512530)

      Which is great news since the bad guys are probably gonna have quantum computers long before we do...

      IIRC, IBM is already recruiting developers and promising to open up computing time to others in a quantum VPS. They're actively trying to create a community now.

      Thanks for the links.

      --
      Technically, lunchtime is at any moment. It's just a wave function.