tag:blogger.com,1999:blog-4513524515428334509.post4398333903607282996..comments2024-03-10T10:55:11.119+00:00Comments on The 1709 Blog: An IP address is not a personMarie-Andree Weisshttp://www.blogger.com/profile/17125973798789498436noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-4513524515428334509.post-5695093008388219172012-05-16T11:45:45.997+01:002012-05-16T11:45:45.997+01:00More from Finland: the CMU Daily reports (16.05.12...More from Finland: the CMU Daily reports (16.05.12) that a court has just ruled that there is no obligation to password protect wireless networks, and that the 'someone else did it on my wi-fi' defence is satisfactory in illegal file-sharing cases, even if the wi-fi network had no password protection, providing the evidence available gives that excuse some credibility.<br /><br />In the Finnish case, reported on by Torrentfreak, the defendant was accused by anti-piracy group CIAPC of downloading unlicensed content in July 2010, but it was shown that that downloading occurred during a twelve minute window via the woman's open wi-fi network while she had 100 guests at a party at her house.<br /><br />The defendant's lawyer told Torrentfreak: "The applicants were unable to provide any evidence that the connection-owner herself had been involved in the file-sharing, the court thus examined whether the mere act of providing a wi-fi connection not protected with a password can be deemed to constitute a copyright-infringing act".<br /><br />Should CIAPC choose to appeal, lawyers for the accused say they might ultimately have the matter considered at the European Courts Of Justice.Benhttps://www.blogger.com/profile/01868498334405853494noreply@blogger.comtag:blogger.com,1999:blog-4513524515428334509.post-5451461387159914582012-05-06T13:34:52.637+01:002012-05-06T13:34:52.637+01:00@Chris Alpiar. Your first suggestion doesn't s...@Chris Alpiar. Your first suggestion doesn't solve the unsecured wifi access issue, where the user would be unknown to the bill payer, and like most of the suggested tech fixes for addressing this problem, your second suggesstion would be relatively easy to circumvent by generating a spoof private (sub-mask) IP address which could not later be tied to a specific individual, either within the household or a random wifi interloper, thus the situation would be as at the present.Andy Jnoreply@blogger.comtag:blogger.com,1999:blog-4513524515428334509.post-74708494889683683792012-05-04T19:23:56.344+01:002012-05-04T19:23:56.344+01:00Wouldnt it still lie to the payer of that IP Addre...Wouldnt it still lie to the payer of that IP Address to either be responsible (like in a household, dad buys the addy so dad is responsible) or to have the tools and wherewithal to log the internal private IP and connect the external to internal and point to the actual perpetrator (like an internet cafe or school or business)?Chris Alpiarhttps://www.blogger.com/profile/07348282338587336715noreply@blogger.com