- Building educational compilations of A/V works for media studies courses.
- Making archival copies of programs (specifically including video games) that can no longer be used in their original form.
- Circumventing access controls that require dongles that are no longer available. (I am amused that the jargon term "dongle" is showing up in official government documents.)
- Breaking open ebooks whose distributed format isn't accessible for, eg, text-to-speech.
- Breaking the programs that "lock" cell phones to specific cellular networks. (This is the one that surprised me, and I'm not sure the interpretation is right, but it seems to be how folks are taking it.)
- Doing what you need to do to clean up the Sony copy-protection-rootkit mess. (They don't mention Sony by name, but I'm sure that's the incident that inspired this particular rule.)
Copyright, and what you can get away with
I just came across this marvelous essay on the SCA fun/authenticity false dichotomy, and a different way of looking at it. It was written some…
(Warning: diary ramble ahead.) Intercon was scheduled a couple of weeks earlier than usual this year -- our experimental hotel last year wasn't…
Almost done with a *very* long weekend at Arisia. Generally been a great time -- worked hard, got to spend lots of time with friends, and have had a…