Congress Leaks Draft Bill To Move Copyright Office Out Of The Library Of Congress

Congress Leaks Draft Bill To Move Copyright Office Out Of The Library Of Congress
from the this-is-a-BAD-idea dept
Well, we all knew this was coming, but Rep. Bob Goodlatte has been passing around a draft of a bill to move the Copyright Office out of the Library of Congress.
Specifically, it would make the head of the Copyright Office, the Copyright Register, a Presidentially appointed position, with 10-year terms, and who could only be removed by the President.
This is a bad and dangerous idea. It’s one that’s designed to give Hollywood and the recording industry even more power and control over an already deeply captured agency.
As it stands now, having the Copyright Office in the Library of Congress provides at least some basic recognition of the actual intent of copyright law, as established by the Constitution to Promote the progress of science. That is, as we’ve pointed out for a long, long time, the intent of copyright is to benefit the public. The mechanism is to provide temporary monopolies to creators as an incentive, before handing the works over to the public.

Yet, the Copyright Office eschews that view, insisting that the role of the Copyright Office is to expand those monopoly rights, and to speak out for the interests of major copyright holders (rarely the creators themselves).

Chrome to immediately stop recognizing Symantec HTTPS certs

Google takes Symantec to the woodshed for mis-issuing 30,000 HTTPS certs
Chrome to immediately stop recognizing EV status and gradually nullify all
By Dan Goodin
Mar 23 2017

In a severe rebuke of one of the biggest suppliers of HTTPS credentials,
Google Chrome developers announced plans to drastically restrict transport
layer security certificates sold by Symantec-owned issuers following the
discovery they have issued more than 30,000 certificates.
Effective immediately, Chrome plans to stop recognizing the extended
validation status of all certificates issued by Symantec-owned certificate
authorities, Ryan Sleevi, a software engineer on the Google Chrome team,
said Thursday in an online forum. Extended validation certificates are
supposed to provide enhanced assurances of a site’s authenticity by showing
the name of the validated domain name holder in the address bar. Under the
move announced by Sleevi, Chrome will immediately stop displaying that
information for a period of at least a year. In effect, the certificates
will be downgraded to less-secure domain-validated certificates.
More gradually, Google plans to update Chrome to effectively nullify all
currently valid certificates issued by Symantec-owned CAs. With Symantec
certificate representing more than 30 percent of the Internet’s valid
certificates by volume in 2015, the move has the potential to prevent
millions of Chrome users from being able to access large numbers of sites.
What’s more, Sleevi cited Firefox data that showed Symantec-issued
certificates are responsible for 42 percent of all certificate validations.
To minimize the chances of disruption, Chrome will stagger the mass
nullification in a way that requires they be replaced over time. To do
this, Chrome will gradually decrease the “maximum age” of Symantec-issued
certificates over a series of releases. Chrome 59 will limit the expiration
to no more than 33 months after they were issued. By Chrome 64, validity
would be limited to nine months.
Thursday’s announcement is only the latest development in Google’s 18-month
critique of practices by Symantec issuers. In October 2015, Symantec fired
an undisclosed number of employees responsible for issuing test
certificates for third-party domains without the permission of the domain
holders. One of the extended-validation certificates covered and and would have given the person possessing it the ability to
cryptographically impersonate those two addresses. A month later, Google
pressured Symantec into performing a costly audit of its certificate
issuance process after finding the mis-issuances went well beyond what
Symantec had first revealed.
In January, an independent security researcher unearthed evidence that
Symantec improperly issued 108 new certificates. Thursday’s announcement
came after Google’s investigation revealed that over a span of years,
Symantec CAs have improperly issued more than 30,000 certificates. Such
mis-issued certificates represent a potentially critical threat to
virtually the entire Internet population because they make it possible for
the holders to cryptographically impersonate the affected sites and monitor
communications sent to and from the legitimate servers. They are a major
violation of the so-called baseline requirements that major browser makers
impose of CAs as a condition of being trusted by major browsers.

Congress' plan to put your data up for sale from Kate Tummarello | EFF Activism Team

Dear Friend of Digital Freedom,
Congress is trying to strip away your online privacy rights. We need to speak up now to stop them.
Your Internet service provider knows a lot about you: the webpages you visit, the things you purchase, the people you talk to, and more. Last year, the federal government updated rules to ensure that the companies that act as gatekeepers to the Internet can’t compromise your privacy to make a profit. Those rules are set to go into effect this year.
Now some members of Congress are trying to change that.
Using a little-known tool called a Congressional Review Act (CRA) resolution, some lawmakers want to not only repeal your privacy protections but also effectively prohibit the FCC from creating similar rules in the future. That could leave consumers without a federal agency to protect online privacy rights.
We need to let our representatives in Congress know that they can’t put ISPs’ demands ahead of their constituents’ privacy. Please call your lawmakers today and tell them to oppose the CRA resolution to repeal the FCC’s privacy rules.
Thank you,
Kate Tummarello
Activism Team
Electronic Frontier Foundation
Electronic Frontier Foundation, 815 Eddy Street, San Francisco, CA 94109 USA E

[CreoleTalk] Colloquium on Mixed Language – Bremen, 28-29 September 2017

Colloquium on Mixed Languages
Mixed languages have fascinated scholars for decades (e.g. Bakker & Mous 1994, Auer 1999, Matras & Bakker 2003, Meakins 2013) because they present an intriguing type of language contact. They arise in bilingual settings, often as markers of identity or as secret languages, and they combine parts from different language families or branches, showing unique splits that often challenge theories of genetic classification and contact-induced change.
Invited speakers:
Peter Bakker (Aarhus University)
Katja Hannß (University of Cologne)
Yaron Matras (University of Manchester)
Marten Mous (Leiden University)
The meeting is organized by the Postcolonial Language Studies research group as part of the Linguistic Colloquium series at the Institute for General and Applied Linguistics (IAAS), University of Bremen.
Maria Mazzoli<>
Eeva Sippola
Call for Papers:
The aim of this colloquium is to examine the current state of the theoretical and empirical debate on mixed languages. We welcome contributions that deal with any aspect of mixed language varieties, for example:
– descriptive and documentation approaches to mixed languages
– theoretical discussions on mixed languages, their origin, and development
– mixed languages in comparison to creoles and pidgins
– different types of language mixing practices
Please submit your abstracts by May 5, 2017 by email to . Please provide the title of the paper, name(s) of the author(s), academic title, and affiliation in the abstract. The abstracts should not exceed 500 words. Notification of acceptance can be expected by June 5, 2017. Papers will be given in English, and they should not exceed 30 minutes plus 10 minutes discussion time.
Important dates:
Submission deadline: May 5, 2017
Announcement of acceptance: June 5, 2017
Conference: September 28-29, 2017

It isn't about Saint Patrick but the historic beginnings of St. Bridgid's Fire!!


Its about the woman, the goddess religion, the historic beginnings of St. Bridgid’s Fire!!

We will visit St. Brigit’s Cathedral and St. Brigit’s ancient Fire House. Then meet Sister Mary leader of the Brigidine Sisters and learn about the Nuns of St. Brigid. You will also and learn where the Sacred Fire is located now that burns once again for all eternity.