Revision as of 23:28, 21 May 2016 editClpo13 (talk | contribs)Autopatrolled, Administrators45,651 edits Reverted 1 edit by 108.66.235.38 (talk): Take it to AFD. (TW)← Previous edit | Revision as of 14:03, 25 May 2016 edit undo99.101.114.126 (talk) Undid revision 721452297 by Clpo13 (talk) Division by zero is invalid.Next edit → | ||
Line 1: | Line 1: | ||
#REDIRECT:] | |||
], from the ] case]] | |||
An '''illegal number''' is a ] that represents information which is illegal to possess, utter, propagate, or otherwise transmit in some ]. Any piece of information is representable as a number; consequently, if communicating a specific set of information is illegal in some way, then the number may be illegal as well.<ref name=carmody2>{{cite web |author=Phil Carmody |title=An Executable Prime Number? | url=http://asdf.org/~fatphil/maths/illegal.html |accessdate=2007-05-08 |quote=Maybe I was reading something between the lines that wasn't there, but if arbitrary programs could be expressed as primes, the immediate conclusion is that all programs, including ones some people wished didn't exist, can too. I.e. the so called 'circumvention devices' of which my previous prime exploit was an example. |archiveurl = http://web.archive.org/web/20070329055313/http://asdf.org/~fatphil/maths/illegal.html |archivedate = 2007-03-29}}</ref><ref name=reg20010319>{{cite news | author=Thomas C Greene |title=DVD descrambler encoded in ‘illegal’ prime number |work=] |date=2001-03-19 |url=http://www.theregister.co.uk/2001/03/19/dvd_descrambler_encoded_in_illegal/ |quote=The question, of course, is whether an interesting number is illegal merely because it can be used to encode a contraband program. |accessdate=2007-05-08}}</ref><ref>{{cite web|url=http://primes.utm.edu/glossary/page.php?sort=Illegal|title=The Prime Glossary: illegal prime|quote=The bottom line: If distributing code is illegal, and these numbers contain (or are) the code, doesn't that make these number illegal?|accessdate=2007-05-09}}</ref> | |||
== Background == | |||
A number may represent some type of ] or ], legal to possess only by certain authorized persons. An ] <!-- let us not post the number here, please, pending the Foundation's decision --> that came to prominence in May 2007 is an example of a number claimed to be a secret, and whose publication or inappropriate possession is claimed to be illegal in the United States. It allegedly assists in the decryption of any ] or ] released before this date. The issuers of a series of cease-and-desist letters claim that the key itself is therefore a copyright circumvention device,<ref>{{cite web |title=AACS licensor complains of posted key |date= |url=http://www.chillingeffects.org/anticircumvention/notice.cgi?NoticeID=7180 |work=] |quote=Illegal Offering of Processing Key to Circumvent AACS Copyright Protection are thereby providing and offering to the public a technology, product, service, device, component, or part thereof that is primarily designed, produced, or marketed for the purpose of circumventing the technological protection measures afforded by AACS (hereafter, the "circumvention offering"). Doing so constitutes a violation of the anti-circumvention provisions of the Digital Millennium Copyright Act (the "DMCA") |accessdate=2007-05-08 }}</ref> and that publishing the key violates Title 1 of the US ]. | |||
In part of the ] court order<ref name=eff1></ref> and in the AACS legal notices, the claimed protection for these numbers is based on their mere possession and the value or potential use of the numbers. This makes their status and legal issues surrounding their distribution quite distinct from that of mere ].<ref name=eff1/> | |||
Any image file or an executable program<ref>{{cite web|url=http://primes.utm.edu/curios/page.php?number_id=953|title=Prime Curios: 48565...29443 (1401-digits)|quote=What folks often forget is a program (any file actually) is a string of bits (binary digits)—so every program is a number.|accessdate=2007-05-09}}</ref> can be regarded as simply a very large ]. In certain jurisdictions, there are images that are illegal to possess,<ref>{{cite web|url=http://www.statutelaw.gov.uk/content.aspx?LegType=All+Legislation&title=criminal+justice+act&Year=1988&searchEnacted=0&extentMatchOnly=0&confersPower=0&blanketAmendment=0&sortAlpha=0&TYPE=QS&PageNumber=1&NavFrom=0&activeTextDocId=2116852&parentActiveTextDocId=2116646&hideCommentary=0&showProsp=0&suppressWarning=0&showAllAttributes=1#attrib | |||
|title=Criminal Justice Act 1988 + amendments|accessdate=2007-05-09}}</ref><ref></ref><ref></ref> due to ] or secrecy/classified status, so the corresponding numbers could be illegal.<ref name="carmody2"/><ref>{{cite book |title= Prime Numbers: The Most Mysterious Figures in Math |first= David |last= Wells |publisher= Wiley |year= 2011 |pages= 126–127 |section= Illegal prime |isbn= 9781118045718 }}</ref> | |||
In 2011 Sony sued ] and members of fail0verflow for ] the ].<ref>. Nilay Patel, Engadget (2011-01-12). Retrieved on 2011-02-16.</ref> Part of the lawsuit complaint was that they had published PS3 keys. Sony also threatened to sue anyone who distributed the keys.<ref name=ars11>{{cite web |url=http://arstechnica.com/gaming/news/2011/02/sony-lawyers-now-targeting-anyone-who-posts-playstation-3-hack.ars/ |title=Sony lawyers now targeting anyone who posts PlayStation 3 hack | date=February 8, 2011 |publisher=Arstechnica}}</ref> Sony later accidentally tweeted an older dongle key through its fictional ] character.<ref>{{cite web |url=http://www.engadget.com/2011/02/09/ps3-jailbreak-code-retweeted-by-sonys-kevin-butler-no-punchl/ |title=PS3 'jailbreak code' retweeted by Sony's Kevin Butler | date=February 9, 2011 |publisher=Engadget}}</ref> | |||
== Flags and steganography == | |||
] | |||
As a protest of the DeCSS case, many people created "]" versions of the illegal information. Dave Touretzky of Carnegie Mellon University created a "Gallery of DeCSS descramblers". In the ], a "] flag" was created. Some illegal numbers are so short that a simple flag (pictured to the right) could be created by using triples of ] as describing ] colors. The argument is that if short numbers can be made illegal, then anything based on those numbers also becomes illegal, like simple patterns of colors, etc. | |||
In the '']'' case, many bloggers (including one at ]) made a "new free speech flag" in homage to the AACS free speech flag. Most of these were based on the "dongle key" rather than the keys Hotz actually released.<ref> by Ben S, Yale Law Tech, 2011 March</ref> Several users of other websites posted similar flags.<ref>See ] description.</ref> | |||
== Other examples == | |||
There are other contexts in which smaller numbers have run afoul of laws or regulations, or drawn the attention of authorities. In 2007, the ] wrote a letter to the Belgian Football Association asking them to forbid the wearing of football shirts displaying the numbers 88 and 18, but no player name, by fans in the stadiums, due to the connotation those numbers were deemed to have with ] in right-wing fan circles.<ref>{{cite web|title=Rugnummers 18 en 88 in opspraak |url=http://www.v-bal.nl/nieuws/bekijk.php?id=19721 |publisher=V-Bal.nl |language=Dutch |date=2007-01-23 |deadurl=unfit |archiveurl=https://web.archive.org/web/20070225075657/http://www.v-bal.nl/nieuws/bekijk.php?id=19721 |archivedate=February 25, 2007 }}</ref> A Swedish student's flat was visited by police in 2015 after the number "21" (that appeared on 2 balloons in the shape of the digits 2 and 1 marking her age) was mistaken by a passer-by for the letters "IS", which were suspected of signifying the ] group.<ref>{{cite web|last1=Toppa|first1=Sabrina|title=Swedish Police Raid Apartment After Mistaking 21st Birthday Party Balloons for ISIS Initials|url=http://time.com/3721642/islamic-state-sweden-police-21-birthday-balloons-isis/|publisher=Time |accessdate=2015-03-09|date=2015-02-25}}</ref> Due to the association with gangs, a school district in ] banned the wearing of jerseys that bore the numbers 18, 14 or 13 (or the reverse, 81, 41 and 31).<ref>{{cite web|last1=Meyer|first1=Jeremy P.|title=Greeley school ban on gang numbers includes Peyton Manning's 18|url=http://www.denverpost.com/ci_21473182/greeley-school-ban-gang-numbers-includes-peyton-mannings|publisher=The Denver Post|accessdate=2015-03-09|date=2012-09-05}}</ref> In 2012 it was reported that the numbers 89, 6 and 4 each became banned search terms on search engines in China, because of the date (1989-06-04) of the ] in Tiananmen Square.<ref>{{cite web|last1=MacKinnon|first1=Mark|title=Banned in China on Tiananmen anniversary: 6, 4, 89 and ‘today’|url=http://www.theglobeandmail.com/news/world/worldview/banned-in-china-on-tiananmen-anniversary-6-4-89-and-today/article4228252/|publisher=The Globe and Mail|accessdate=2015-03-09|date=2012-06-04}}</ref> | |||
== See also == | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
== References == | |||
{{reflist}} | |||
== External links == | |||
{{wiktionary}} | |||
* {{cite journal |url= http://www.libraryjournal.com/article/CA6529387.html |title= Mediating between law and technology requires vigilance and education, not a technical solution |first1= Matthew |last1= Skala |first2= Brett |last2= Bonfield |first3= Mary Fran |last3= Torpey |journal= Library Journal |date= 2008-02-15 |archiveurl= https://web.archive.org/web/20130330020536/http://www.libraryjournal.com/article/CA6529387.html |archivedate= 2013-03-30 }} | |||
* . ''Journal of Information, Law & Technology'', Vol. 3, 2002 | |||
* {{cite web|url=http://www.cs.cmu.edu/~dst/DeCSS/Gallery/Debate/index.htm|title=A Great Debate: Is Computer Code Protected Speech?|accessdate=2007-05-09}} | |||
* {{cite web |url=http://www.opendemocracy.net/media/digging_in_4599.jsp |title=Digging in |date=2007-05-09 |author=] |publisher=] |accessdate=2007-05-10}} | |||
* | |||
* , Carnegie Mellon University, Dave Touretzky | |||
* by ] | |||
* by ] | |||
* by ] | |||
* by ] | |||
* {{cite web|last=Grime|first=James|title=Illegal Numbers|url=http://www.numberphile.com/videos/illegal_numbers.html|work=Numberphile|publisher=]}} | |||
] | |||
] | |||
] | |||
] |
Revision as of 14:03, 25 May 2016
Redirect to: