Originally posted by converge
Originally posted by SlackJaw
Originally posted by converge
Maybe the hardware has OOB communication, RFID, tracking, or other extra hardware.
Originally posted by LoST
downloading only cracked commercial software and avoiding all free alternatives just because I'm a college kid and I can. Determination of this is going to be limited to the system/browser submitted through. Read as: if Microsoft is using this as a metric in any way to determine a pirate->legal-address, how could they get around folks that sign up through work or school systems?
Ok. Fine. I'll try to play the "Devil's Advocate" here and be serious. :-P
Case:
I grab their offer through my work PC and it is fully legit because the business is smart, now that legit verification is associated with my home address that contains (theoretically, not condoning stealing software here..) piles of illegal software. Does this clear me?
I grab their offer through my work PC and it is fully legit because the business is smart, now that legit verification is associated with my home address that contains (theoretically, not condoning stealing software here..) piles of illegal software. Does this clear me?
When Law Enforcement can't find certain criminals, but know there are non-cooperative people that can reach them, sting operations have been created where someone pretending they were running a contest claims the criminal-on-the-loose has won a [microwave|washer|car|toaster oven|.*] but must, "come down to claim it." Some criminals come down, and some do not. Just because the do not come down, does not "clear" them.
Prisons are full of people that thought they would never get caught, and I am sure there are software pirates that think they will never get caught too, and as a result be sloppy with the evidence they leave available.
Likewise, I go over to visit a friend and sign up through his computer using my own address; does this now implicate me, even though I had no idea my friend was running a pirated copy? How can they prove the system->owner?
Say a user has a, "passport," and has signed into MSN Messenger, and is using MS Windows Update, and there is a determination that the system is a pirated copy of Windows, and MSN Messenger's Passport ID is one that claimed the thumb drive. Do we have an indication that the holder of that passport is using pirated software? Sure. With an address, would we have a starting point for looking for the person? Sure.
Will all people be sloppy and order from home? Probably not, but I would bet most people (pirates or otherwise) that order this devces, will order for delivery to a place that is conveinient.
If there are limits of "one per address" then the "work address" may work for one person.
In building a case, the more evidence that they have of a person committing a crime, the better their chances of success in court.
Sure doubt can be created through other means... "I share my Passport ID with other people," or 'someone stole my passport account" or other similar ideas. However, if they show you logged in from only a handful of locations (work, home, friends' houses) that you frequent, but no other locations, that can work in their favor to diminish the effects of such doubt.
They can't. They can send out scare propaganda to try and convince people to 'go genuine' .. but legally they wouldn't have a foot to stand on without seizing systems as evidence.
Going further, if they send a notice, and then find the same machine still appears to be a pirated copy of windows then what? If they find that suddenly the machine is no longer claiming it is a pirated copy of windows, they have some indication the snail mail letter "worked."
Other means I can understand, but I think this conspiracy has been busted. Tune is next week for 'Cleaning Fish Anus with Exposives"
I chose that word to make the original funnier. It would not be a conspiracy if Microsoft worked within the law.
--edit: now.. if they could shows logs of downloaded updates from a known-illegal copy of their software, tied to a static IP address (likely a business or school in this case) they would not need these tactics to obtain mailing addresses .. they can already pursue copyright abuse through ISPs (I think, I do not believe this is limited to transmission of IP)
I wonder how many people remain signed in with their passport ID through MSN Messenger while they perform Windows Updates.
Now... stop interfering with my spell! How can you expect the zombies to wear tinfoil hats if this spell does not work? ]:>
Comment