Illegal number
Encyclopedia
An illegal number is a number
Number
A number is a mathematical object used to count and measure. In mathematics, the definition of number has been extended over the years to include such numbers as zero, negative numbers, rational numbers, irrational numbers, and complex numbers....

 that represents information which is illegal to possess, utter or propagate. Any information that can be represented in binary format is representable as a number, and therefore if the information itself is illegal in some way, the pure number itself may be illegal.

Background

An illegal number may represent some type of classified information
Classified information
Classified information is sensitive information to which access is restricted by law or regulation to particular groups of persons. A formal security clearance is required to handle classified documents or access classified data. The clearance process requires a satisfactory background investigation...

 or trade secret
Trade secret
A trade secret is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known or reasonably ascertainable, by which a business can obtain an economic advantage over competitors or customers...

, legal to possess only by certain authorized persons. An AACS encryption key
AACS encryption key controversy
A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC began issuing demand letters to websites publishing a 128-bit number, represented in hexadecimal as 09 F9 11...

  that came to prominence in May 2007 is an example of a number claimed to be a secret, and whose publication or inappropriate possession is claimed to be illegal in the United States. It allegedly assists in the decryption of any HD DVD
HD DVD
HD DVD is a discontinued high-density optical disc format for storing data and high-definition video.Supported principally by Toshiba, HD DVD was envisioned to be the successor to the standard DVD format...

 or Blu-ray Disc
Blu-ray Disc
Blu-ray Disc is an optical disc storage medium designed to supersede the DVD format. The plastic disc is 120 mm in diameter and 1.2 mm thick, the same size as DVDs and CDs. Blu-ray Discs contain 25 GB per layer, with dual layer discs being the norm for feature-length video discs...

 released before this date. The issuers of a series of cease-and-desist letters claim that the key itself is therefore a copyright circumvention device, and that publishing the key violates Title 1 of the US Digital Millennium Copyright Act
Digital Millennium Copyright Act
The Digital Millennium Copyright Act is a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization . It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to...

.

In part of the DeCSS
DeCSS
DeCSS is a computer program capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, there was no way for computers running a Linux-based operating system to play video DVDs....

 court order and in the AACS legal notices, the claimed protection for these numbers is based on their mere possession and the value or potential use of the numbers. This makes their status and legal issues surrounding their distribution quite distinct from that of mere copyright infringement
Copyright infringement
Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.- "Piracy" :...

.

Any image file or an executable program can be regarded as simply a very large binary number. In certain jurisdictions, there are images that are illegal to possess, due to obscenity
Obscenity
An obscenity is any statement or act which strongly offends the prevalent morality of the time, is a profanity, or is otherwise taboo, indecent, abhorrent, or disgusting, or is especially inauspicious...

 or secrecy/classified status, so the corresponding numbers could be illegal.

In 2011 Sony sued George Hotz
George Hotz
George Francis Hotz , alias geohot, million75 or simply mil, is an American hacker known for unlocking the iPhone, allowing the phone to be used with other wireless carriers, contrary to AT&T and Apple's intent...

 and members of fail0verflow for jailbreaking
Privilege escalation
Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user...

 the PlayStation 3
PlayStation 3
The is the third home video game console produced by Sony Computer Entertainment and the successor to the PlayStation 2 as part of the PlayStation series. The PlayStation 3 competes with Microsoft's Xbox 360 and Nintendo's Wii as part of the seventh generation of video game consoles...

. Part of the lawsuit complaint was that they had published PS3 keys. Sony also threatened to sue anyone who distributed the keys. Sony later accidentally tweeted an older dongle key through its fictional Kevin Butler
Kevin Butler (character)
Kevin Butler is a marketing character used by Sony Computer Entertainment America as part of their It Only Does Everything and Long Live Play advertising campaigns for the PlayStation 3 in North America...

 character.

Flags and steganography

As a protest of the DeCSS case, many people created 'steganographic
Steganography
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity...

' versions of the illegal information. Dave Touretzky of Carnegie Mellon University created a "Gallery of DeCSS descramblers". In the AACS encryption key controversy
AACS encryption key controversy
A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC began issuing demand letters to websites publishing a 128-bit number, represented in hexadecimal as 09 F9 11...

, a 'free speech flag' was created. The illegal number was so short that a simple flag (pictured above) could be created by using the numbers as red-green-blue colors. The argument is that if short numbers can be made illegal, then anything based on those numbers also becomes illegal, like simple patterns of colors, etc.

In the Sony Computer Entertainment America v. George Hotz
Sony Computer Entertainment America v. George Hotz
SCEA v. Hotz is a lawsuit in the United States by Sony Computer Entertainment of America against George Hotz and associates of the group fail0verflow for jailbreaking and reverse engineering the Playstation 3.-Timeline:...

 case, many bloggers (including one at Yale Law School
Yale Law School
Yale Law School, or YLS, is the law school of Yale University in New Haven, Connecticut, United States. Established in 1824, it offers the J.D., LL.M., J.S.D. and M.S.L. degrees in law. It also hosts visiting scholars, visiting researchers and a number of legal research centers...

) made a 'new free speech flag' in homage to the AACS free speech flag. Most of these were based on the 'dongle key' rather than the keys Hotz actually released. Several users of other websites posted similar flags.

See also

  • Prior art
    Prior art
    Prior art , in most systems of patent law, constitutes all information that has been made available to the public in any form before a given date that might be relevant to a patent's claims of originality...

  • Illegal prime
    Illegal prime
    An illegal prime is a prime number that represents information that it is forbidden to possess or distribute. One of the first illegal primes was discovered in 2001. When interpreted in a particular way, it describes a computer program that bypasses the digital rights management scheme used on DVDs...

  • AACS encryption key controversy
    AACS encryption key controversy
    A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC began issuing demand letters to websites publishing a 128-bit number, represented in hexadecimal as 09 F9 11...

  • Texas Instruments signing key controversy
    Texas Instruments signing key controversy
    The Texas Instruments signing key controversy refers to the controversy which resulted from Texas Instruments' response to a project to factorize the 512-bit RSA cryptographic keys needed to write custom firmware to TI devices.-Project:...

  • PlayStation 3
  • Streisand effect
    Streisand effect
    The Streisand effect is a primarily online phenomenon in which an attempt to hide or remove a piece of information has the unintended consequence of publicizing the information more widely...


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK