JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for POETRYETC Archives


POETRYETC Archives

POETRYETC Archives


POETRYETC@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

POETRYETC Home

POETRYETC Home

POETRYETC  2001

POETRYETC 2001

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Re: Mediation

From:

Candice Ward <[log in to unmask]>

Reply-To:

Poetryetc provides a venue for a dialogue relating to poetry and poetics <[log in to unmask]>

Date:

Thu, 23 Aug 2001 20:59:22 -0400

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (335 lines)

From an Aug. 22d VnuNet.Com article by James Middleton:

An academic at Carnegie Mellon University has set up an online gallery
showing the different methods and media that have been used to publish the
controversial Content Scrambling System (CSS) which unscrambles code used
fro decoding the DVD format.

Such systems first came to light last year when Judge Lewis Kaplan issued a
ruling preventing the distribution of code for reading encrypted DVDs,
namely DeCSS. The ruling was based on a section of the similarly
controversial Digital Millennium Copyright Act (DMCA).

Although Hollywood won the case, preventing the publishing of code for DVD
decoding, the ruling sparked off an outraged response from the internet
community, which came up with a number of ways to exploit loopholes and
publish the code.

One of the most ingenious methods includes Copyleft.com's sweatshirt with
the code printed on the front accompanied by the phrase: "I am a
circumvention device."

The online gallery's curator, Dr. David Touretzky, of the computer science
department at Carnegie Mellon, asked: "Would merely wearing such a shirt in
public constitute 'trafficking in a circumvention device' as defined in
section 1201 of the DMCA?

"If code that can be directly compiled and executed may be suppressed under
the DMCA, as Judge Kaplan asserts in his preliminary ruling, but a textual
description of the same algorithm may not be suppressed, then where exactly
should the line be drawn?"

(Complete article at http://vnunet.com/News/1124916)

Other creative "circumvention devices" contributed to the Carnegie Mellon
online Gallery of CSS Descramblers
(http://www.cs.cmu.edu/%7Edst/DeCSS/Gallery/index.html) are variously
mathematical, musical (both the code set to music--by Joe Wecker of the band
Don't Eat Pete--and the code as music--a MIDI file created by Jeff
Schrepfer), cinematic (DeCSS The Movie by Samuel Hocevar), dramatic (an MP3
reading of the css_descramble.c file by Xader Vartec), artistic, animational
(a DeCSS animation called Stairs of Freedom by Anders Sandberg) and
crypto-animational (Javascript and VBScript routines using animated
Microsoft Agents Merlin and Robby to explain the mathematical CSS decryption
formula contributed by Charles Hannum), translational (i.e., of the
Anonymous C source code into Standard ML, Scheme, Brainfuck--a
Turing-machine language with only 8 operators--"new-language.txt,"
"plain-english.html," "css-auth.eng" and "css-auth.babel-eng"), pictorial
(the code depicted in 3 page.gif files entitled "Screen Dump"), and a Yahoo
e-greeting card with the source code for css_descramble.c as the message
(submitted anonymously along with a coupon for a Slurpee).

Nor did poetry go unrepresented among the circumvention devices contributed
to the Gallery--an anonymous poet who cannot even be traced (this submission
having been sent via anonymous remailer) contributed "How to Decrypt a DVD:
in Haiku Form," headed by the following anti-copyright notice:

(I abandon my
Exclusive rights to make or
Perform copies of

This work, U.S. Code
Title Seventeen, section
One Hundred and Six.)

In haiku form the decryption runs to 37 pages, so I'm reduced to providing
only excerpts from it, but you can read the whole thing at
http://www.cs.cmu.edu/%7Edst/DeCSS/Gallery/decss-haiku.txt

Here is the poem's opening, in which the Homeric epic is brought to bear on
the haiku stanzaic:

Muse! When we learned to
count, little did we know all
the things we could do

some day by shuffling
those numbers: Pythagoras
said "All is number"

long before he saw
computers and their effects,
or what they could do

by computation,
naïve and mechanical
fast arithmetic.
....

Now help me, Muse, for
I wish to tell a piece of
controversial math,

for which the lawyers
of DVD CCA
don't forbear to sue:

that they alone should
know or have the right to teach
these skills and these rules.

(Do they understand
the content, or is it just
the effects they see?)

And all mathematics
is full of stories (just read
Eric Temple Bell);

and CSS is
no exception to this rule.
Sing, Muse, decryption

once secret, as all
knowledge, once unknown: how to
decrypt DVDs. 


Here are a few more of my favorite bits:

Reader! Think not that
technical information
ought not be called speech;

think not diagrams,
schematics, tables, numbers,
formulae -- like the

terrifying and 
uniquely moving, though cliche,
Einstein equation

"Energy is just
the same as matter, but for
a little factor,

speed of light by speed
of light, and we are ourselves
frozen energy."
....

The poet has choice
of words and order, symbols,
imagery, and use

of metaphor. She
can allude, suggest, permit
ambiguities.

She need not say just
what she means, for readers can
always interpret.

Poets too, despite
their famous "license" sometimes
are constrained by rules:

How often have we
heard that some strange twist of plot
or phrase was simply

"Metri causa," for
the meter's sake, solely done
"to fit the meter"?

Programmers' art as
that of natural scientists
is to be precise,

complete in every 
detail of description, not
leaving things to chance.

Reader, see how yet
technical communicants
deserve free speech rights;

see how numbers, rules,
patterns, languages you don't
yourself speak yet,

still should in law be
protected from suppression,
called valuable speech!
....

This part is really
exciting for movie fans:
decrypt DVDs!

Well, at least sectors
of DVDs, but they are
made up of sectors.

Sectors (of two to
the eleventh bytes) are the
encryption units.

Rejoice then, get some
popcorn out and butter if
you aren't vegan.

Margarine works well
if you're vegan, or if you
are watching your weight.

I've heard you can put
tarragon on your popcorn.
I haven't tried it.

Why did I tell you
to rejoice? Because we are
about to watch a

movie, at least if
we have a good MPEG-2
player close at hand.

We need two things now,
though, beyond our MPEG-2
players and popcorn:

a vector "SEC" of
two thousand forty-eight bytes,
disk sector contents.

(These start off in their
encrypted form, but we will
leave them decrypted.)

And a vector KEY
of six bytes, the decrypted
title key we'll use.

We will use these few
internal variables:
t1 through t6,

unsigned integers.
Remember them from before?
END is a pointer

to the end of the
sector, which is SEC plus two
thousand forty-eight.
....

Now I want a drink
(mnemonics in crypto poems
are great!); exercise

from singing so long
makes me thirst for a glass of
soda, slice of pie.

For this is the end
of the decryption process;
you can now go home.



But wait! I hear a
voice entreating me to stay:
"O, the Tables tell!"

Alas, I have not
as yet declared to you the
CSS Tables.

This is a major 
issue, in that I don't know
what these tables _mean_:

our noble guide has
told us in outline what they
are for, or something

of their structure. But
to me, a humble poet
of mathematics,

they are opaque, they
are certain combinations
of ancient, noble

Number. Their inner
logic, aitia, telos,
still unknown to me.

Herein a clear free
speech question: would courts see fit
to muzzle me, then,

from speaking numbers,
technical data, which I
did not make and more

cannot memorize,
cannot explain in detail,
cannot understand?

I have these numbers.
They have meaning, this is clear:
else why suppress them?

I wish to speak or
let the Muse announce through me
Tables of Numbers.
....

Mary Jo White, the
United States Attorney
for S.D.N.Y.,

your logic erodes
any meaningful power
Internet speakers

would retain against
state censorship. Do you care?
Have you any shame?

Fight, brave amici,
with effective, functional
Argumentation.

I'll try to help by
singing these octets, until
court orders forbid.


And so on, right up to the "uniquely moving" end, which I won't spoil for
you by extracting here--enjoy!

Candice

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

May 2024
April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
July 2006
June 2006
May 2006
April 2006
March 2006
February 2006
January 2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager