1 00:00:04,400 --> 00:00:07,800 Speaker 1: Welcome to tech Stuff, a production from I Heart Radio. 2 00:00:11,800 --> 00:00:14,520 Speaker 1: Hey there, and welcome to tech Stuff. I'm your host, 3 00:00:14,640 --> 00:00:17,680 Speaker 1: Jonathan Strickland. I'm an executive producer with I Heart Radio 4 00:00:17,720 --> 00:00:21,080 Speaker 1: and how the tech are you. I've been getting some 5 00:00:21,160 --> 00:00:24,880 Speaker 1: requests on Twitter as well as the talk back feature 6 00:00:25,120 --> 00:00:28,520 Speaker 1: that's in the I Heart Radio app under the tech 7 00:00:28,560 --> 00:00:30,760 Speaker 1: Stuff podcast label. More on that at the end of 8 00:00:30,760 --> 00:00:33,519 Speaker 1: the episode, and I wanted to start tackling some of 9 00:00:33,560 --> 00:00:37,199 Speaker 1: those requests this week. We also will have a special 10 00:00:37,280 --> 00:00:39,639 Speaker 1: episode coming up a bit later this week, so it's 11 00:00:39,640 --> 00:00:43,360 Speaker 1: gonna be a little different from a normal tech Stuff week. 12 00:00:43,800 --> 00:00:46,520 Speaker 1: That will actually carry over next week in a bit 13 00:00:47,000 --> 00:00:48,880 Speaker 1: beyond as well, because I'm going to take a short 14 00:00:48,960 --> 00:00:52,839 Speaker 1: vacation from work. But I'm trying to record stuff in 15 00:00:52,880 --> 00:00:55,240 Speaker 1: advance to at least cover some of that so that 16 00:00:55,360 --> 00:00:58,959 Speaker 1: it's not all reruns. Anyway, let's get to the request 17 00:00:59,040 --> 00:01:02,840 Speaker 1: for today's episode. Now, today's episode comes to us courtesy 18 00:01:02,920 --> 00:01:07,400 Speaker 1: of the Gregorlis on Twitter, who asks, quote, could you 19 00:01:07,480 --> 00:01:11,280 Speaker 1: do a tech Stuff tidbit episode about the illegal number? 20 00:01:11,720 --> 00:01:16,240 Speaker 1: End quote? And yes I can. The Gregorlis. Now, first 21 00:01:16,400 --> 00:01:20,880 Speaker 1: I should say there's not just one illegal number. Not 22 00:01:21,440 --> 00:01:24,960 Speaker 1: if we follow the logic, and I use the term 23 00:01:25,000 --> 00:01:30,560 Speaker 1: loosely about what makes a specific number illegal. There is 24 00:01:30,720 --> 00:01:34,319 Speaker 1: a particular number referred to as the illegal number, and 25 00:01:34,360 --> 00:01:37,200 Speaker 1: I'll explain that as well. I will not be saying 26 00:01:37,400 --> 00:01:40,920 Speaker 1: that number, not because I fear reprisal. It's not that 27 00:01:41,000 --> 00:01:43,479 Speaker 1: I'm worried that the Feds are gonna kick down my door. 28 00:01:44,200 --> 00:01:47,680 Speaker 1: It's because the illegal number is a one thousand, four 29 00:01:47,760 --> 00:01:51,040 Speaker 1: hundred one digit number. And by the time I would 30 00:01:51,040 --> 00:01:55,120 Speaker 1: finish saying it, we be well into Tuesday. So this 31 00:01:55,240 --> 00:01:57,920 Speaker 1: topic ties into some other stuff I've been talking about 32 00:01:58,000 --> 00:02:01,720 Speaker 1: in recent episodes. And to understand how a number can 33 00:02:01,720 --> 00:02:06,080 Speaker 1: be illegal, we have to cover a few different concepts. 34 00:02:06,120 --> 00:02:10,040 Speaker 1: Some of those concepts deal with technology, uh, some deal 35 00:02:10,080 --> 00:02:13,400 Speaker 1: with politics, and some deal with business. And as you 36 00:02:13,480 --> 00:02:17,120 Speaker 1: might imagine, the last two categories there, politics and business 37 00:02:17,360 --> 00:02:19,760 Speaker 1: have a great deal over of overlap because we're talking 38 00:02:19,800 --> 00:02:24,840 Speaker 1: about the United States in particular. Also, you could overlay 39 00:02:24,880 --> 00:02:29,480 Speaker 1: the word stupid or at least absurd over those two. 40 00:02:29,840 --> 00:02:33,679 Speaker 1: All right, I'm gonna cover the political and business stuff 41 00:02:33,760 --> 00:02:37,960 Speaker 1: first because this ties into the specific case of the 42 00:02:38,280 --> 00:02:42,840 Speaker 1: illegal number. So back in here in the United States, 43 00:02:43,440 --> 00:02:47,240 Speaker 1: then President Bill Clinton signed into law the Digital Millennium 44 00:02:47,560 --> 00:02:51,560 Speaker 1: Copyright Act, or d m c A. The d m 45 00:02:51,600 --> 00:02:56,320 Speaker 1: c A in turn incorporated two World Intellectual Property Organization 46 00:02:56,480 --> 00:03:01,320 Speaker 1: or wi BO treaties UH. These were the WIPO Copyright 47 00:03:01,360 --> 00:03:05,600 Speaker 1: Treaty and the WIPEO Performances and Phonograms Treaty, both of 48 00:03:05,600 --> 00:03:10,040 Speaker 1: which had very similar language in them. Now, WHIPO itself 49 00:03:10,240 --> 00:03:14,080 Speaker 1: is an international organization that is part of the United Nations, 50 00:03:14,400 --> 00:03:17,640 Speaker 1: and it has been since nineteen seventy four. The purpose 51 00:03:17,680 --> 00:03:21,480 Speaker 1: of WIPO is to create international agreement on certain aspects 52 00:03:21,480 --> 00:03:25,840 Speaker 1: of copyright so that the created works enjoy copyright protection 53 00:03:26,360 --> 00:03:30,720 Speaker 1: across borders, though the extent of that protection and the 54 00:03:30,760 --> 00:03:34,240 Speaker 1: penalties incurred by those who ignore it are largely up 55 00:03:34,240 --> 00:03:39,200 Speaker 1: to each individual country's government, so enforcement and everything that's 56 00:03:39,200 --> 00:03:41,680 Speaker 1: not covered in the treaty just that these are the 57 00:03:41,720 --> 00:03:45,440 Speaker 1: basic concepts that we want to make sure countries across 58 00:03:45,480 --> 00:03:48,000 Speaker 1: the world agree on. So the d m c A 59 00:03:48,160 --> 00:03:51,480 Speaker 1: is America's version of adhering to the rules established by 60 00:03:51,480 --> 00:03:54,280 Speaker 1: those two WIPO treaties. The protections in the d m 61 00:03:54,360 --> 00:03:57,120 Speaker 1: c A stem from those treaties, but the actual wording 62 00:03:57,160 --> 00:04:01,240 Speaker 1: and implementation are uniquely American. UH. The d m c 63 00:04:01,360 --> 00:04:04,480 Speaker 1: A also has other stuff that wasn't directly covered by WIPO. 64 00:04:04,720 --> 00:04:09,320 Speaker 1: For example, under Title five of the d m c A, UH, 65 00:04:09,360 --> 00:04:12,680 Speaker 1: there was a new form of protection created for quote 66 00:04:12,960 --> 00:04:17,640 Speaker 1: the design of vessel hulls end quote as in boats 67 00:04:18,440 --> 00:04:21,080 Speaker 1: and a dooming boats because the update to the Copyright 68 00:04:21,120 --> 00:04:25,479 Speaker 1: Code only applies to boat hole designs with holes that 69 00:04:25,520 --> 00:04:28,440 Speaker 1: are no longer than two hundred feet. So yeah, this 70 00:04:28,520 --> 00:04:31,400 Speaker 1: update got real specific. But never mind that we're not 71 00:04:31,440 --> 00:04:33,880 Speaker 1: here to talk about boats. I'll say that for some 72 00:04:34,000 --> 00:04:37,479 Speaker 1: future episode. The part we need to focus on is 73 00:04:37,520 --> 00:04:41,719 Speaker 1: the bit that created section twelve oh one one hundred 74 00:04:41,800 --> 00:04:46,720 Speaker 1: one to Title seventeen of the US Code. That section covers, quote, 75 00:04:46,960 --> 00:04:51,440 Speaker 1: the obligation to provide adequate and effective protection against circumvention 76 00:04:51,480 --> 00:04:55,479 Speaker 1: of technological measures used by copyright owners to protect their 77 00:04:55,520 --> 00:04:59,719 Speaker 1: works end quote, or as we typically think about it, 78 00:05:00,040 --> 00:05:04,080 Speaker 1: digital rights management or DRM. Now, a lot of people, 79 00:05:04,240 --> 00:05:08,080 Speaker 1: including myself, have oversimplified the intent of this piece of 80 00:05:08,200 --> 00:05:11,760 Speaker 1: legislation to say that this protection means it's illegal to 81 00:05:11,760 --> 00:05:14,760 Speaker 1: get around DRM, which means that while you are within 82 00:05:14,839 --> 00:05:17,520 Speaker 1: your rights here in the United States to make a 83 00:05:17,560 --> 00:05:20,800 Speaker 1: backup copy of a work for your personal use, whether 84 00:05:21,120 --> 00:05:26,040 Speaker 1: it's a digital music file or some software or a book. 85 00:05:26,360 --> 00:05:28,039 Speaker 1: I mean, it can be a physical thing. It doesn't 86 00:05:28,040 --> 00:05:31,279 Speaker 1: have to be digital. Whatever it is. You are allowed 87 00:05:31,320 --> 00:05:34,760 Speaker 1: to make a personal copy for your own backup purposes 88 00:05:34,800 --> 00:05:37,760 Speaker 1: as long as that's all it's for. But you are 89 00:05:37,800 --> 00:05:41,039 Speaker 1: not allowed to circumvent DRM in order to do it, 90 00:05:41,480 --> 00:05:44,599 Speaker 1: which is kind of like saying the stuff that's inside 91 00:05:44,600 --> 00:05:48,160 Speaker 1: this locked safe is yours, and you can do whatever 92 00:05:48,240 --> 00:05:50,839 Speaker 1: you want with the stuff that's in this safe. You 93 00:05:50,880 --> 00:05:53,599 Speaker 1: can copy it as many times as you like, but 94 00:05:53,800 --> 00:05:56,800 Speaker 1: you're not allowed to open the safe to get at it. Now, 95 00:05:56,839 --> 00:06:00,000 Speaker 1: that analogy isn't perfect, because you can still use DRM 96 00:06:00,040 --> 00:06:03,920 Speaker 1: to material, but there can be some limitations depending on 97 00:06:04,000 --> 00:06:06,680 Speaker 1: the implementation of DRM. But I think it gets the 98 00:06:06,800 --> 00:06:09,920 Speaker 1: idea of the issue across well. The d m c 99 00:06:10,080 --> 00:06:12,880 Speaker 1: A gets a bit more nuanced than just that. It's 100 00:06:12,880 --> 00:06:15,960 Speaker 1: actually a little more complicated, though in practice it doesn't 101 00:06:16,040 --> 00:06:18,600 Speaker 1: end up mattering very much. See, the d m c 102 00:06:18,800 --> 00:06:23,359 Speaker 1: A actually differentiates between measures that control the access to 103 00:06:23,480 --> 00:06:27,919 Speaker 1: a copyrighted work and measures that prevent unauthorized copying of 104 00:06:27,920 --> 00:06:31,839 Speaker 1: a copyrighted work. So, if you were making a personal 105 00:06:31,880 --> 00:06:36,440 Speaker 1: backup copy of a copyrighted work that is legitimate, it's 106 00:06:36,440 --> 00:06:40,320 Speaker 1: a type of fair use. So if the technological prevention 107 00:06:40,400 --> 00:06:44,200 Speaker 1: of copying is all it's stopping you from making a copy, 108 00:06:44,320 --> 00:06:47,719 Speaker 1: it's okay to circumvent that protection, assuming the copy you 109 00:06:47,760 --> 00:06:51,320 Speaker 1: make is legitimate under the umbrella fair use. So if 110 00:06:51,320 --> 00:06:54,120 Speaker 1: you were archiving, say a piece of software, and the 111 00:06:54,200 --> 00:06:57,880 Speaker 1: only thing stopping you was an anti copy piece of technology, 112 00:06:58,480 --> 00:07:03,040 Speaker 1: there's no legal issue getting around it. However, if the 113 00:07:03,160 --> 00:07:08,640 Speaker 1: DRM controls access to the copyrighted work, it's a different story. 114 00:07:09,120 --> 00:07:11,120 Speaker 1: The d m c A is clear about that is 115 00:07:11,240 --> 00:07:15,680 Speaker 1: illegal to circumvent or develop tools meant to circumvent DRM 116 00:07:15,760 --> 00:07:19,920 Speaker 1: that controls access to a work. Well, here's the real problem. 117 00:07:20,000 --> 00:07:24,560 Speaker 1: The way companies use DRM is tied directly to access. Yes, 118 00:07:24,640 --> 00:07:28,600 Speaker 1: copying is part of that, but it's a sub part. 119 00:07:29,000 --> 00:07:31,720 Speaker 1: So trying to get around it so that you can 120 00:07:31,720 --> 00:07:34,440 Speaker 1: make your personal copy also means having to get around 121 00:07:34,480 --> 00:07:38,400 Speaker 1: the access part, and that's illegal. Let's consider the DRM 122 00:07:38,440 --> 00:07:41,520 Speaker 1: that Apple used to use on digital music files. They 123 00:07:41,520 --> 00:07:44,360 Speaker 1: don't use it anymore, but they used to use a 124 00:07:44,440 --> 00:07:48,680 Speaker 1: system called fair Play. Apple was strong armed into developing 125 00:07:49,000 --> 00:07:52,200 Speaker 1: fair Play by the major music labels of the time, 126 00:07:52,680 --> 00:07:55,160 Speaker 1: the DRM put a limit on how many devices would 127 00:07:55,160 --> 00:07:58,880 Speaker 1: be allowed to access any given digital file. That would 128 00:07:58,880 --> 00:08:02,560 Speaker 1: prevent the unauthorized distribution of digital songs that were downloaded 129 00:08:02,560 --> 00:08:05,640 Speaker 1: from Apple's store, because you would very quickly hit the 130 00:08:05,840 --> 00:08:08,840 Speaker 1: small limit of devices that would be allowed to access 131 00:08:08,840 --> 00:08:12,040 Speaker 1: the file, and creating or using a tool to strip 132 00:08:12,280 --> 00:08:14,960 Speaker 1: those files of that protection would be against the law 133 00:08:15,040 --> 00:08:17,920 Speaker 1: because of the d m c A. Now, there are 134 00:08:17,920 --> 00:08:20,480 Speaker 1: a few other exceptions to the d m c A 135 00:08:20,560 --> 00:08:23,160 Speaker 1: that would allow folks to get around DRM and it 136 00:08:23,200 --> 00:08:27,480 Speaker 1: wouldn't be illegal, but those are extremely limited in scope. 137 00:08:28,320 --> 00:08:32,880 Speaker 1: For example, a nonprofit library would be allowed to circumvent 138 00:08:33,000 --> 00:08:37,199 Speaker 1: DRM on some software, for instance, only for the purposes 139 00:08:37,280 --> 00:08:42,079 Speaker 1: of evaluating the copyrighted software if the library were considering 140 00:08:42,200 --> 00:08:45,199 Speaker 1: obtaining a legit copy for itself. So, in other words, 141 00:08:45,559 --> 00:08:48,320 Speaker 1: this nonprofit library is saying, we're thinking about getting this, 142 00:08:48,480 --> 00:08:50,600 Speaker 1: but we don't know yet. We want to evaluate it. 143 00:08:51,200 --> 00:08:53,320 Speaker 1: We don't own a copy of it, so we have 144 00:08:53,400 --> 00:08:57,920 Speaker 1: to use this method to circumvent DRM to evaluate the copy. 145 00:08:58,280 --> 00:09:02,280 Speaker 1: That would be okay under those very specific circumstances. Security 146 00:09:02,320 --> 00:09:05,439 Speaker 1: companies could circumvent DRM for the purposes of testing computer 147 00:09:05,520 --> 00:09:08,079 Speaker 1: and network security and there are a few other exceptions, 148 00:09:08,080 --> 00:09:11,120 Speaker 1: but they're all very limited and they have specific criteria 149 00:09:11,200 --> 00:09:13,080 Speaker 1: that have to be met in order for it to 150 00:09:13,440 --> 00:09:18,959 Speaker 1: pass muster. So we arrived at a point where, because 151 00:09:19,160 --> 00:09:23,160 Speaker 1: of the technological protection overlaid on top of some copyrighted works, 152 00:09:23,640 --> 00:09:26,920 Speaker 1: US citizens were denied the rights to create personal backup 153 00:09:26,960 --> 00:09:31,280 Speaker 1: copies as is permitted under fair use, which is pretty absurd. Right, 154 00:09:31,440 --> 00:09:34,000 Speaker 1: you're allowed to do this thing, only there's a lock 155 00:09:34,320 --> 00:09:36,600 Speaker 1: that prevents you from doing that thing, and it's illegal 156 00:09:37,080 --> 00:09:41,440 Speaker 1: to get rid of the lock. So you're effectively saying 157 00:09:41,440 --> 00:09:43,120 Speaker 1: it's illegal for me to make a backup, and and 158 00:09:43,160 --> 00:09:45,440 Speaker 1: the court would say, oh no, no, it's perfectly legal 159 00:09:45,520 --> 00:09:47,720 Speaker 1: for you to make a backup. You just can't break 160 00:09:47,760 --> 00:09:49,680 Speaker 1: the lock that prevents you from making a backup to 161 00:09:49,720 --> 00:09:52,440 Speaker 1: make a backup. But if you can make a backup 162 00:09:52,679 --> 00:09:57,280 Speaker 1: without getting around or breaking the lock, you're good to go. Well, 163 00:09:57,360 --> 00:10:00,760 Speaker 1: that's patently absurd. You cannot do those things. It's the 164 00:10:00,800 --> 00:10:03,360 Speaker 1: sort of situation you would expect to encounter in a 165 00:10:03,400 --> 00:10:08,360 Speaker 1: a novel like Catch twenty two. Now companies were thrilled, 166 00:10:08,679 --> 00:10:12,240 Speaker 1: right like the big music labels were thrilled. Movie and 167 00:10:12,320 --> 00:10:17,280 Speaker 1: television studios were thrilled, publishers were thrilled. Organizations like the 168 00:10:17,280 --> 00:10:22,520 Speaker 1: Electronic Frontier Foundation were not thrilled. Also, while the measures 169 00:10:22,520 --> 00:10:28,080 Speaker 1: were intended to curb piracy, uh that largely failed. Piracy 170 00:10:28,160 --> 00:10:30,320 Speaker 1: was still running rampant, and in fact, there was a 171 00:10:30,320 --> 00:10:32,760 Speaker 1: pretty strong argument that the pirates were ending up with 172 00:10:32,840 --> 00:10:37,280 Speaker 1: better versions of the copyrighted works because their versions didn't 173 00:10:37,320 --> 00:10:39,640 Speaker 1: have all that pesky DRM attached to them. They had 174 00:10:39,679 --> 00:10:44,240 Speaker 1: stripped it out, and DRM could cause other problems like 175 00:10:44,520 --> 00:10:48,720 Speaker 1: for legit users, your DRM could actually interfere with your 176 00:10:48,800 --> 00:10:54,600 Speaker 1: access to material you had fairly and legally purchased. So 177 00:10:55,040 --> 00:10:58,400 Speaker 1: legitimate customers who did not remove their DRM had inferior 178 00:10:58,559 --> 00:11:01,679 Speaker 1: versions of the works that the pirates were enjoying. The 179 00:11:01,800 --> 00:11:04,400 Speaker 1: d m c A did, however, give big software and 180 00:11:04,440 --> 00:11:07,840 Speaker 1: media companies the equivalent of an enormous cannon They could 181 00:11:07,840 --> 00:11:11,720 Speaker 1: point at people who were found or suspected to be 182 00:11:11,800 --> 00:11:16,920 Speaker 1: downloading material without permission to do so. So they fueled 183 00:11:17,000 --> 00:11:24,080 Speaker 1: a lot of incredibly disproportionate lawsuits against people, and it 184 00:11:24,160 --> 00:11:28,520 Speaker 1: did not win the industry any favors. Anyway, we're gonna 185 00:11:28,600 --> 00:11:30,719 Speaker 1: pivot in a second. We're gonna come back to the 186 00:11:30,800 --> 00:11:33,440 Speaker 1: d m c A and DRM toward the end of 187 00:11:33,480 --> 00:11:37,400 Speaker 1: this episode because it will play a pivotal role in 188 00:11:38,280 --> 00:11:42,360 Speaker 1: the creation of the concept of the illegal number. First, 189 00:11:42,400 --> 00:11:44,360 Speaker 1: we're gonna take a quick break, and when we come back, 190 00:11:44,480 --> 00:11:55,320 Speaker 1: we're gonna talk about abstraction. We're back, and it's time 191 00:11:55,360 --> 00:11:58,920 Speaker 1: for us to talk about computer languages and machine language. 192 00:11:58,960 --> 00:12:02,480 Speaker 1: It's a good jumping off point for the concept of abstraction. Now, 193 00:12:02,480 --> 00:12:04,760 Speaker 1: I'm sure you all know that when you really get 194 00:12:04,800 --> 00:12:07,800 Speaker 1: down to the hardware level of what's going on inside 195 00:12:07,800 --> 00:12:11,080 Speaker 1: a computer, all the information passing through the system is 196 00:12:11,080 --> 00:12:15,480 Speaker 1: in machine code a k A binary that's zeros and 197 00:12:15,600 --> 00:12:20,000 Speaker 1: ones bits. In other words, machines use zeros and ones 198 00:12:20,080 --> 00:12:23,320 Speaker 1: to represent anything and everything, and we can use zeros 199 00:12:23,320 --> 00:12:26,280 Speaker 1: and ones to represent different types of stuff. We just 200 00:12:26,360 --> 00:12:29,160 Speaker 1: need to gather enough zeros and ones to be able 201 00:12:29,200 --> 00:12:32,960 Speaker 1: to do it. So a collection of eight binary digits 202 00:12:33,280 --> 00:12:37,079 Speaker 1: is a bite. Eight bits is a bite. That's something 203 00:12:37,080 --> 00:12:39,320 Speaker 1: we arrived at after a lot of back and forth 204 00:12:39,320 --> 00:12:42,079 Speaker 1: in the computer industry. But there's no need to rehash 205 00:12:42,120 --> 00:12:45,559 Speaker 1: all of that right now. With eight binary digits, you 206 00:12:45,600 --> 00:12:49,280 Speaker 1: can represent up to two hundred fifty six different values 207 00:12:49,840 --> 00:12:52,040 Speaker 1: or two to the power of eight. We have two 208 00:12:52,080 --> 00:12:55,520 Speaker 1: possible states zero and one, and we have eight total 209 00:12:55,640 --> 00:12:58,160 Speaker 1: binary digits, so it's two to the power of eight. 210 00:12:58,600 --> 00:13:02,040 Speaker 1: With eight binary digits, we could designate different letters and figures. 211 00:13:02,280 --> 00:13:05,680 Speaker 1: For example, the letter A and binary is zero one 212 00:13:06,600 --> 00:13:11,880 Speaker 1: zero zero zero zero zero one. The letter Z in 213 00:13:11,960 --> 00:13:16,760 Speaker 1: binary is zero one zero one one zero one zero. 214 00:13:17,040 --> 00:13:19,720 Speaker 1: And yes, it sounds like I'm singing robots by Fly 215 00:13:19,840 --> 00:13:22,800 Speaker 1: of the concords, but that's how we could designate A 216 00:13:22,960 --> 00:13:26,160 Speaker 1: and Z in binary. Now you've probably already noticed that 217 00:13:26,280 --> 00:13:29,640 Speaker 1: using binary would be far too clunky for humans. We 218 00:13:29,720 --> 00:13:32,960 Speaker 1: would quickly get lost while trying to spell a simple word, 219 00:13:33,040 --> 00:13:36,280 Speaker 1: let alone create complex instructions for a computer to follow. 220 00:13:36,720 --> 00:13:40,560 Speaker 1: For that reason, we have different ways or abstractions to 221 00:13:40,679 --> 00:13:46,080 Speaker 1: deal with machine languages. Programming languages are an example. With 222 00:13:46,160 --> 00:13:49,880 Speaker 1: programming languages, we can use formats that humans can read, 223 00:13:50,440 --> 00:13:53,800 Speaker 1: some we can read more easily than others, and machines 224 00:13:53,960 --> 00:13:58,800 Speaker 1: cannot read. These not natively programming languages that aren't far 225 00:13:58,880 --> 00:14:03,360 Speaker 1: removed from the struction set that's used by the machine itself. 226 00:14:03,400 --> 00:14:07,920 Speaker 1: Those are called low level languages. Assembly, or sometimes as 227 00:14:08,000 --> 00:14:13,160 Speaker 1: Simbler language, is the ultimate example of low level languages. 228 00:14:13,200 --> 00:14:16,400 Speaker 1: These days, a utility program would take the instructions written 229 00:14:16,400 --> 00:14:21,000 Speaker 1: an assembly, which would very much mirror the instruction set 230 00:14:21,120 --> 00:14:23,960 Speaker 1: of the architecture of the machine that's running the stuff, 231 00:14:24,480 --> 00:14:28,400 Speaker 1: and then it would convert the assembler language into executable 232 00:14:28,440 --> 00:14:33,680 Speaker 1: machine code. So it takes this one representation of processes 233 00:14:34,360 --> 00:14:38,880 Speaker 1: and converted into a different representation of processes, and it's 234 00:14:39,040 --> 00:14:42,880 Speaker 1: the representation that the machine can actually use. Higher level 235 00:14:42,880 --> 00:14:47,240 Speaker 1: programming languages have more levels of abstraction in them. They 236 00:14:47,280 --> 00:14:51,000 Speaker 1: are generally speaking easier for people to work with, so 237 00:14:51,240 --> 00:14:54,960 Speaker 1: it's much easier to write a program in these languages. 238 00:14:55,000 --> 00:14:58,840 Speaker 1: The instruction sets in these programming languages are further removed 239 00:14:59,240 --> 00:15:02,160 Speaker 1: from the base architecture of the machine that you are 240 00:15:02,200 --> 00:15:06,160 Speaker 1: programming for. In fact, there are programming languages where you 241 00:15:06,160 --> 00:15:09,640 Speaker 1: can program for all sorts of different machines, and you 242 00:15:09,760 --> 00:15:12,880 Speaker 1: use a different utility for each machine to convert it 243 00:15:12,920 --> 00:15:16,120 Speaker 1: into a language the machine can use. And because of 244 00:15:16,160 --> 00:15:18,600 Speaker 1: all this, the computer code has to go through a 245 00:15:18,680 --> 00:15:23,440 Speaker 1: process called compiling before a machine can actually execute the program. 246 00:15:23,480 --> 00:15:26,160 Speaker 1: If there was no compiling process, the machine wouldn't know 247 00:15:26,240 --> 00:15:29,000 Speaker 1: what to do with the sets of instructions. It would 248 00:15:29,040 --> 00:15:32,800 Speaker 1: be it would be as if you spoke only one language, 249 00:15:33,280 --> 00:15:37,400 Speaker 1: someone else spoke only a different language, and you just 250 00:15:37,480 --> 00:15:39,960 Speaker 1: tried to keep on asking the same question like eight 251 00:15:39,960 --> 00:15:43,000 Speaker 1: different ways in English, for example, and the other person 252 00:15:43,080 --> 00:15:46,040 Speaker 1: only speaks a Mandarin, it wouldn't matter how many times 253 00:15:46,080 --> 00:15:49,520 Speaker 1: you reworded the question. The languages are fundamentally different. There 254 00:15:49,520 --> 00:15:52,840 Speaker 1: would be no communication same sort of thing. Without compiling, 255 00:15:53,480 --> 00:15:55,880 Speaker 1: the machine has no way of understanding what is you 256 00:15:55,920 --> 00:16:00,080 Speaker 1: wanted to do. So the compiler is absolutely key in 257 00:16:00,120 --> 00:16:04,240 Speaker 1: this case. Now, the compiler essentially takes one language and 258 00:16:04,280 --> 00:16:07,560 Speaker 1: converts it into a different language. That language could be 259 00:16:07,720 --> 00:16:13,800 Speaker 1: assembly language. So compiling could take your very complex, sophisticated program, 260 00:16:13,880 --> 00:16:16,560 Speaker 1: break it down into all the different steps that would 261 00:16:16,560 --> 00:16:20,560 Speaker 1: be required to make that program work in assembly language, 262 00:16:20,840 --> 00:16:23,440 Speaker 1: and then through an assembler that we get converted into 263 00:16:23,480 --> 00:16:26,320 Speaker 1: machine code, and then the computer would ultimately quote unquote, 264 00:16:26,560 --> 00:16:31,160 Speaker 1: understand what to do with your program. So you might 265 00:16:31,200 --> 00:16:33,960 Speaker 1: write a program in a language like Python, and a 266 00:16:34,000 --> 00:16:37,200 Speaker 1: compiler might take that and translate it into assembly language, 267 00:16:37,200 --> 00:16:39,840 Speaker 1: and then through an assembler that gets converted into machine 268 00:16:39,880 --> 00:16:43,280 Speaker 1: code and a computer actually uses that. So really we 269 00:16:43,320 --> 00:16:45,440 Speaker 1: can think of all this as a general process by 270 00:16:45,440 --> 00:16:48,600 Speaker 1: which we humans take stuff that we can work with 271 00:16:48,640 --> 00:16:51,880 Speaker 1: easily and convert that into stuff that a machine can 272 00:16:51,960 --> 00:16:54,840 Speaker 1: work with easily. There's a lot more to it than that, 273 00:16:55,040 --> 00:16:59,200 Speaker 1: and I am oversimplifying, but you get the idea now. 274 00:16:59,680 --> 00:17:03,200 Speaker 1: The reason why I went through all that rigamarole is 275 00:17:03,240 --> 00:17:06,800 Speaker 1: one to talk about the actual types of information that 276 00:17:06,880 --> 00:17:10,320 Speaker 1: machines work with and why that's important, and also to 277 00:17:10,320 --> 00:17:13,879 Speaker 1: get across this idea that there are so many different 278 00:17:13,920 --> 00:17:17,240 Speaker 1: ways that we can represent numbers, and there are different 279 00:17:17,240 --> 00:17:22,080 Speaker 1: ways we can represent stuff in numerical form. And if 280 00:17:22,119 --> 00:17:24,919 Speaker 1: we go back to a bide of information, those eight bits, 281 00:17:25,720 --> 00:17:28,320 Speaker 1: we can describe that in several ways. Right. We can 282 00:17:28,359 --> 00:17:31,720 Speaker 1: say eight bits represents two to the eight values, or 283 00:17:31,760 --> 00:17:34,200 Speaker 1: we could say it represents two D fifty six values, 284 00:17:34,359 --> 00:17:37,240 Speaker 1: or that we can say it represents values from zero 285 00:17:37,320 --> 00:17:39,920 Speaker 1: to two D fifty five, and so on. All of 286 00:17:39,960 --> 00:17:41,880 Speaker 1: those are essentially saying the same thing, but we're saying 287 00:17:41,880 --> 00:17:44,320 Speaker 1: it in different ways. Right. Well, there are other ways 288 00:17:44,320 --> 00:17:48,200 Speaker 1: to represent numbers as well. Another numeral system that's often 289 00:17:48,320 --> 00:17:52,760 Speaker 1: used in computing is called hexadecimal. Hexadecimal is a base 290 00:17:53,119 --> 00:17:56,960 Speaker 1: sixteen system. So the system that you and I count 291 00:17:57,040 --> 00:18:00,399 Speaker 1: in is based ten. Right, you start at zero, you 292 00:18:00,440 --> 00:18:03,680 Speaker 1: go to nine, then you move into the tens. So 293 00:18:03,840 --> 00:18:07,400 Speaker 1: ten is just one zero, eleven is just one. One 294 00:18:07,520 --> 00:18:09,320 Speaker 1: do you go up to nineteen? You move up to 295 00:18:09,359 --> 00:18:13,399 Speaker 1: the twenties. That's to zero. So that's base ten. Right. Well, 296 00:18:13,480 --> 00:18:17,280 Speaker 1: how the heck do you have a base sixteen? Right? 297 00:18:17,320 --> 00:18:18,840 Speaker 1: How do you get up to a point where? How 298 00:18:18,840 --> 00:18:21,200 Speaker 1: do you count in base sixteen? You only have ten 299 00:18:21,320 --> 00:18:25,040 Speaker 1: single digit numerals from zero to nine. Well, the way 300 00:18:25,119 --> 00:18:28,240 Speaker 1: you create base sixteen as you start to borrow from letters, 301 00:18:28,640 --> 00:18:32,240 Speaker 1: hexadecimal designation goes from zero through nine, and then to 302 00:18:32,320 --> 00:18:36,080 Speaker 1: represent values ten through fifteen, we switch to letters and 303 00:18:36,200 --> 00:18:40,960 Speaker 1: use a through F. Now, in hexadecimal, a single digit 304 00:18:41,200 --> 00:18:46,119 Speaker 1: represents four bits, so two hexadecimal digits are equal to 305 00:18:46,240 --> 00:18:49,760 Speaker 1: a byte or eight bits. So we can go from 306 00:18:50,400 --> 00:18:54,679 Speaker 1: eight zeros to eight ones for the full range of 307 00:18:55,160 --> 00:18:58,879 Speaker 1: expression with bits right, eight zeros to eight ones, that 308 00:18:58,920 --> 00:19:01,000 Speaker 1: would be zero to two hundred fifty five. If we 309 00:19:01,040 --> 00:19:04,320 Speaker 1: thought about it numerically, in like the regular digits that 310 00:19:04,359 --> 00:19:08,679 Speaker 1: we use today, but in hexadecimal, we would represent that 311 00:19:08,760 --> 00:19:11,320 Speaker 1: as zero zero, which would be the same thing as 312 00:19:11,440 --> 00:19:14,520 Speaker 1: eight zeros, or f f, which would be the same 313 00:19:14,520 --> 00:19:17,840 Speaker 1: thing as eight ones. So hexadecimal creates a slightly easier 314 00:19:17,880 --> 00:19:21,119 Speaker 1: way to represent binary data than just working with zeros 315 00:19:21,160 --> 00:19:24,199 Speaker 1: and once. Now, the whole reason I brought all this 316 00:19:24,320 --> 00:19:26,800 Speaker 1: up is that it really is important to understand there 317 00:19:26,840 --> 00:19:30,320 Speaker 1: are so many different ways to represent numbers. You can 318 00:19:30,320 --> 00:19:34,280 Speaker 1: convert one number system into another number system. You can 319 00:19:34,280 --> 00:19:37,200 Speaker 1: convert numbers into other stuff too, like you could create 320 00:19:37,240 --> 00:19:40,800 Speaker 1: an image based off numbers, or vice versa. You could 321 00:19:40,800 --> 00:19:44,840 Speaker 1: take an image and reduce it to numerical data representing 322 00:19:44,880 --> 00:19:48,520 Speaker 1: the image. If we couldn't do that, computers would not work, 323 00:19:48,680 --> 00:19:50,359 Speaker 1: or at least they wouldn't be able to do anything 324 00:19:50,400 --> 00:19:54,000 Speaker 1: other than perform operations on numbers like a very simple calculator. 325 00:19:54,600 --> 00:19:57,840 Speaker 1: But Ada Lovelace had it right. We can use numbers 326 00:19:57,840 --> 00:20:01,199 Speaker 1: to represent all sorts of incredible things, from images to 327 00:20:01,359 --> 00:20:05,280 Speaker 1: music to sophisticated programs like the Curse of Monkey Island. 328 00:20:05,960 --> 00:20:08,840 Speaker 1: All right, when we come back, we're gonna go back 329 00:20:08,840 --> 00:20:11,000 Speaker 1: to the d m c A, and we're gonna combine 330 00:20:11,119 --> 00:20:13,320 Speaker 1: the things we learned about the d m c A 331 00:20:13,520 --> 00:20:16,040 Speaker 1: and the things we learned about using numbers to represent 332 00:20:16,080 --> 00:20:19,320 Speaker 1: different things and figure out how a number can be 333 00:20:19,400 --> 00:20:29,959 Speaker 1: illegal But first, let's take another quick break. All right, 334 00:20:30,200 --> 00:20:31,760 Speaker 1: back to the d m c A. The d m 335 00:20:31,800 --> 00:20:35,080 Speaker 1: c A makes it illegal to attempt to circumvent access 336 00:20:35,280 --> 00:20:39,800 Speaker 1: controls on digital copyrighted works. That means it's illegal to 337 00:20:39,840 --> 00:20:43,320 Speaker 1: develop tools expressly for the purposes of getting around digital 338 00:20:43,400 --> 00:20:46,480 Speaker 1: rights management or d r M. So let's say that 339 00:20:46,600 --> 00:20:50,040 Speaker 1: someone goes out and writes a program that is essentially 340 00:20:50,040 --> 00:20:53,560 Speaker 1: a work around of d r M. That program is 341 00:20:53,680 --> 00:20:56,119 Speaker 1: illegal unless it happens to be used in one of 342 00:20:56,160 --> 00:21:01,760 Speaker 1: those very narrow exemptions I mentioned earlier. Distributing that program 343 00:21:01,840 --> 00:21:06,199 Speaker 1: is also illegal. You could reduce the program to something 344 00:21:06,280 --> 00:21:09,840 Speaker 1: like its source code, and you could represent that source 345 00:21:09,880 --> 00:21:13,520 Speaker 1: code in some other format. You could then post that 346 00:21:13,640 --> 00:21:16,880 Speaker 1: format on a web page for anyone to see, and 347 00:21:17,080 --> 00:21:21,040 Speaker 1: someone could see that representation, they could copy the representation, 348 00:21:21,400 --> 00:21:24,760 Speaker 1: they could reverse the process you use to arrive at 349 00:21:25,520 --> 00:21:28,720 Speaker 1: that representation, and then they would have the source code, 350 00:21:28,880 --> 00:21:33,879 Speaker 1: which means now that person has possession of the illegal material. So, 351 00:21:33,920 --> 00:21:38,360 Speaker 1: in other words, by changing the representation of the program, 352 00:21:38,480 --> 00:21:43,840 Speaker 1: you have created a different means of of displaying that information. 353 00:21:44,760 --> 00:21:49,640 Speaker 1: Does that, in fact make that display itself illegal? If 354 00:21:49,680 --> 00:21:51,760 Speaker 1: we follow the d m c A rules, to the letter, 355 00:21:52,240 --> 00:21:55,479 Speaker 1: and we acknowledge that it is possible to share something 356 00:21:55,560 --> 00:21:58,960 Speaker 1: that is illegal to possess if we just represent that 357 00:21:59,040 --> 00:22:02,640 Speaker 1: thing in numerical value, well, by extension, the only logical 358 00:22:02,680 --> 00:22:05,920 Speaker 1: thing we can say is that that number itself is illegal. 359 00:22:06,200 --> 00:22:07,919 Speaker 1: And in fact, you could go a step further. You 360 00:22:07,920 --> 00:22:12,359 Speaker 1: could break down illegal material such as an encryption key 361 00:22:12,440 --> 00:22:17,160 Speaker 1: for example, convert that into hexadecimal code. Convert the hexadecimal 362 00:22:17,200 --> 00:22:21,119 Speaker 1: code into an image, and use that image to distribute 363 00:22:21,200 --> 00:22:24,240 Speaker 1: the code. This whole thing is still reversible, Like you 364 00:22:24,280 --> 00:22:26,040 Speaker 1: have to know the steps that were used, but you 365 00:22:26,080 --> 00:22:29,680 Speaker 1: could do those same steps in the reverse order and 366 00:22:29,720 --> 00:22:32,639 Speaker 1: we're you know, arrive at that source code. This this 367 00:22:32,800 --> 00:22:35,840 Speaker 1: could be a form of steganography, that's hiding a message 368 00:22:35,880 --> 00:22:39,800 Speaker 1: inside something else, like an image. Doesn't have to be 369 00:22:39,840 --> 00:22:42,719 Speaker 1: an image, but that's frequently what we think of when 370 00:22:42,760 --> 00:22:46,879 Speaker 1: we think of steganography. Now, if we follow D M 371 00:22:46,960 --> 00:22:49,240 Speaker 1: C A to the logical conclusion, we would say, well, 372 00:22:49,280 --> 00:22:52,200 Speaker 1: that would mean the image itself would be illegal. So really, 373 00:22:52,200 --> 00:22:54,399 Speaker 1: when you break it down, the concept of illegal numbers 374 00:22:54,480 --> 00:22:57,160 Speaker 1: is meant to show how absurd it is to try 375 00:22:57,200 --> 00:23:02,879 Speaker 1: and legislate information, because information is mutable. That is, you know, 376 00:23:02,920 --> 00:23:06,200 Speaker 1: we can change it from one format into a different format, 377 00:23:06,400 --> 00:23:10,440 Speaker 1: and the format that would seem innocent and definitely abstract 378 00:23:10,520 --> 00:23:14,000 Speaker 1: from whatever it was representing, and any attempts to ban 379 00:23:14,160 --> 00:23:17,520 Speaker 1: that information becomes absurd because how far do you go 380 00:23:17,640 --> 00:23:20,639 Speaker 1: with that. Let's say, for example, that I cracked the 381 00:23:20,760 --> 00:23:23,960 Speaker 1: encryption used by some software companies to protect their work. 382 00:23:24,160 --> 00:23:26,480 Speaker 1: Right it limits the access to their work, And I've 383 00:23:26,480 --> 00:23:29,440 Speaker 1: cracked it, and I create a program that lets other 384 00:23:29,480 --> 00:23:33,879 Speaker 1: people circumvent this protection, and then I represent the program 385 00:23:33,920 --> 00:23:38,200 Speaker 1: as a hexadecimal value, which, when you convert it over, 386 00:23:38,320 --> 00:23:41,720 Speaker 1: becomes the source code for this program. But then I 387 00:23:41,760 --> 00:23:46,520 Speaker 1: take that hexadecimal value and I use it to run 388 00:23:46,600 --> 00:23:50,879 Speaker 1: through another program that creates a very very large number, 389 00:23:51,480 --> 00:23:53,760 Speaker 1: and it's totally reversible. If you were to take that 390 00:23:53,840 --> 00:23:56,639 Speaker 1: very very large number and run it through a similar program, 391 00:23:56,680 --> 00:23:59,600 Speaker 1: you would arrive at the hexadecimal value, which you could 392 00:23:59,600 --> 00:24:02,560 Speaker 1: then can vert into the source code, and you would 393 00:24:02,560 --> 00:24:06,160 Speaker 1: be back where I started. So I post this very 394 00:24:06,280 --> 00:24:09,760 Speaker 1: very large number, which by itself, without any other context, 395 00:24:10,000 --> 00:24:13,200 Speaker 1: is just a number. Can the software company actually claim 396 00:24:13,560 --> 00:24:17,440 Speaker 1: that that very large number is in violation of its 397 00:24:17,520 --> 00:24:21,119 Speaker 1: intellectual property, because isn't that absurd, But because of the 398 00:24:21,160 --> 00:24:24,679 Speaker 1: nature of digital information, all of this is entirely possible. 399 00:24:25,280 --> 00:24:30,159 Speaker 1: Complicating matters is that sometimes once you do all these conversions, 400 00:24:30,280 --> 00:24:33,320 Speaker 1: you end up with a prime number. Depends on what 401 00:24:33,440 --> 00:24:36,120 Speaker 1: you're using in order to create these. Like I said, 402 00:24:36,119 --> 00:24:39,560 Speaker 1: you're usually using some form of software that takes the 403 00:24:39,720 --> 00:24:44,200 Speaker 1: value of something and converts it into another format. There 404 00:24:44,200 --> 00:24:47,359 Speaker 1: are some where if you do this and you set 405 00:24:47,400 --> 00:24:50,720 Speaker 1: things just right, then the end output you get is 406 00:24:50,720 --> 00:24:54,960 Speaker 1: a prime number. If that prime number represents illegal material, 407 00:24:55,240 --> 00:24:58,080 Speaker 1: does that make that prime number illegal? And if so, 408 00:24:58,200 --> 00:25:00,800 Speaker 1: wouldn't that mean that listing that number in a database 409 00:25:00,880 --> 00:25:04,080 Speaker 1: of prime numbers would be a crime. But there are 410 00:25:04,359 --> 00:25:07,080 Speaker 1: legit reasons you want to be able to get lists 411 00:25:07,080 --> 00:25:11,600 Speaker 1: of prime numbers. Prime numbers are incredibly useful in computation. 412 00:25:12,560 --> 00:25:14,560 Speaker 1: And the reason I talked so much about the d 413 00:25:14,680 --> 00:25:17,879 Speaker 1: m c A is that the big instance of the 414 00:25:17,920 --> 00:25:21,040 Speaker 1: concept of illegal numbers. In fact, the number that is 415 00:25:21,119 --> 00:25:26,200 Speaker 1: referenced as the illegal number, popped up because of an 416 00:25:26,240 --> 00:25:28,560 Speaker 1: issue that happened around two thousand one. That's when some 417 00:25:28,600 --> 00:25:32,879 Speaker 1: programmers created software that they called d E c s S. 418 00:25:33,600 --> 00:25:37,760 Speaker 1: This software could decrypt DVDs, so DVDs had encryption that 419 00:25:37,800 --> 00:25:42,040 Speaker 1: would prevent people from doing things like copying the DVDs. Now, 420 00:25:42,040 --> 00:25:43,840 Speaker 1: there are a couple of reasons you might want to 421 00:25:43,880 --> 00:25:46,640 Speaker 1: decrypt a DVD. One might be that you do want 422 00:25:46,680 --> 00:25:49,959 Speaker 1: to copy DVDs, you want to create bootlegs of it 423 00:25:50,000 --> 00:25:52,439 Speaker 1: and sell bootlegs at a mark down price on a 424 00:25:52,480 --> 00:25:55,600 Speaker 1: street corner or something. That's the dread piracy route that 425 00:25:55,720 --> 00:25:59,200 Speaker 1: the big companies were all scared of. But another reason 426 00:25:59,359 --> 00:26:01,600 Speaker 1: you might want to get around DVD encryption would be 427 00:26:01,640 --> 00:26:04,720 Speaker 1: to run the DVD on, say a computer system that 428 00:26:04,880 --> 00:26:08,600 Speaker 1: had an operating system that wasn't supported by DVD encryption, 429 00:26:09,040 --> 00:26:11,879 Speaker 1: like Lenox back in the day. You have a Linux computer. 430 00:26:11,960 --> 00:26:14,159 Speaker 1: You want to watch a DVD on that Linux computer, 431 00:26:14,280 --> 00:26:18,400 Speaker 1: but because Linux is not compatible with that encryption method, 432 00:26:18,480 --> 00:26:21,440 Speaker 1: you need to strip the encryption off of it first. Now, 433 00:26:21,480 --> 00:26:24,000 Speaker 1: according to the d m c A, the d e 434 00:26:24,119 --> 00:26:27,600 Speaker 1: c s S program was illegal. It allows one to 435 00:26:27,640 --> 00:26:31,080 Speaker 1: circumvent the access control of the copyrighted work on the DVD, 436 00:26:31,640 --> 00:26:34,639 Speaker 1: and d e c s S prompted criminal cases against 437 00:26:34,680 --> 00:26:38,560 Speaker 1: the programmers, only one of whom was ever identified, and 438 00:26:38,560 --> 00:26:41,600 Speaker 1: and that one was acquitted. But in the United States, 439 00:26:41,720 --> 00:26:45,359 Speaker 1: d E c s S was deemed an illegal piece 440 00:26:45,400 --> 00:26:50,840 Speaker 1: of software. Well, then a programmer named Phil Carmatti got 441 00:26:50,880 --> 00:26:55,040 Speaker 1: the nifty idea to convert the code, the source code 442 00:26:55,240 --> 00:26:58,199 Speaker 1: for d E c s S into a prime number. 443 00:26:58,440 --> 00:27:01,680 Speaker 1: So he took the source code, which was originally programmed 444 00:27:01,680 --> 00:27:04,840 Speaker 1: in the C programming language, and he used a Unix 445 00:27:04,880 --> 00:27:09,879 Speaker 1: process to reduce the file size. Um it's called g zip. 446 00:27:10,840 --> 00:27:13,560 Speaker 1: He then took the new file format and he ran 447 00:27:13,600 --> 00:27:17,320 Speaker 1: it through a different program in order to arrive at 448 00:27:17,320 --> 00:27:21,359 Speaker 1: a one thousand, four hundred one digit prime number. He 449 00:27:21,359 --> 00:27:25,040 Speaker 1: would later actually boost that up to one five digits 450 00:27:25,160 --> 00:27:29,639 Speaker 1: for reasons I'll explain in a second. Now, when that 451 00:27:29,720 --> 00:27:33,040 Speaker 1: prime number gets converted into hexadecimal, it would represent a 452 00:27:33,160 --> 00:27:36,199 Speaker 1: g ZIP file of the original source code for d 453 00:27:36,359 --> 00:27:39,439 Speaker 1: E c SS. Now, his whole point was that he 454 00:27:39,480 --> 00:27:45,520 Speaker 1: could create an archivable representation of this illegal software. You see, 455 00:27:45,520 --> 00:27:49,720 Speaker 1: because prime numbers are important and they could be mathematically interesting. 456 00:27:50,440 --> 00:27:53,960 Speaker 1: If you were to take information that has deemed illegal 457 00:27:54,000 --> 00:27:57,640 Speaker 1: for whatever reason and use this conversion process and turn 458 00:27:57,680 --> 00:28:01,840 Speaker 1: it into an interesting prime number, then that would be 459 00:28:02,000 --> 00:28:04,800 Speaker 1: enough to have reason to archive it like it's it's 460 00:28:05,119 --> 00:28:07,640 Speaker 1: important you need to be able to archive it, which 461 00:28:07,680 --> 00:28:11,880 Speaker 1: means that whether the information is illegal or not, you 462 00:28:11,920 --> 00:28:16,800 Speaker 1: can you can save it, you can archive it, and um, yeah, sure, 463 00:28:16,920 --> 00:28:19,720 Speaker 1: that number ultimately, if you go through this process, represents 464 00:28:19,720 --> 00:28:23,520 Speaker 1: a way to decrypt DVDs illegally. But that same number, 465 00:28:23,520 --> 00:28:26,080 Speaker 1: it can also be mathematically interesting on its own merits, 466 00:28:26,400 --> 00:28:28,960 Speaker 1: So making it illegal to publish that number would be 467 00:28:29,040 --> 00:28:32,120 Speaker 1: a real sticky wicket, as they say, And that's why 468 00:28:32,359 --> 00:28:35,320 Speaker 1: he boosted it to one thousand, nine five digits. The 469 00:28:35,440 --> 00:28:38,000 Speaker 1: one thousand, four hundred one digit prime number, he argued, 470 00:28:38,160 --> 00:28:43,280 Speaker 1: was not really mathematically interesting and so it probably did 471 00:28:43,320 --> 00:28:49,960 Speaker 1: not represent a really a strong case for being archivable 472 00:28:50,040 --> 00:28:53,920 Speaker 1: without being illegal. But by boosting it, he said, well, 473 00:28:54,160 --> 00:28:57,880 Speaker 1: this number does have some interest mathematically, and so therefore 474 00:28:58,320 --> 00:29:02,040 Speaker 1: it would be ludicrous to deem it as illegal, even 475 00:29:02,080 --> 00:29:06,840 Speaker 1: though it also represents this illegal process. Now, Karamati's thought 476 00:29:06,880 --> 00:29:09,400 Speaker 1: was that the banning of pure information just doesn't make 477 00:29:09,440 --> 00:29:12,520 Speaker 1: any sense, and he sees source code as being a 478 00:29:12,560 --> 00:29:16,000 Speaker 1: type of pure information. And I think his argument is 479 00:29:16,040 --> 00:29:19,040 Speaker 1: really strong since we've seen there are so many different 480 00:29:19,040 --> 00:29:23,160 Speaker 1: ways to represent pure information. You could convert those numbers 481 00:29:23,200 --> 00:29:25,960 Speaker 1: into music if you liked you would just need to 482 00:29:25,960 --> 00:29:29,440 Speaker 1: create a program that would follow specific rules in order 483 00:29:29,480 --> 00:29:32,560 Speaker 1: to take this and turn it into music. And then 484 00:29:33,000 --> 00:29:36,200 Speaker 1: would you say that that music which represents these numbers, 485 00:29:36,200 --> 00:29:40,920 Speaker 1: which ultimately, through however many layers of abstraction, represents illegal material. 486 00:29:41,080 --> 00:29:44,719 Speaker 1: Would you say the music itself as illegal. It's all 487 00:29:44,840 --> 00:29:47,120 Speaker 1: very puzzling, and the more you think about it, the 488 00:29:47,120 --> 00:29:49,280 Speaker 1: more it feels like you're slipping into an alice in 489 00:29:49,320 --> 00:29:52,959 Speaker 1: Wonderland situation. Lewis Carroll would have a field day with 490 00:29:53,080 --> 00:29:58,360 Speaker 1: this stuff. But that is the concept of the illegal number, 491 00:29:58,720 --> 00:30:03,440 Speaker 1: a number that ultimate le represents a process to decrypt DVDs. 492 00:30:03,440 --> 00:30:06,280 Speaker 1: And as I said, it is the illegal number, But 493 00:30:06,320 --> 00:30:10,200 Speaker 1: there are other illegal numbers. Really, anything that could represent 494 00:30:10,320 --> 00:30:14,920 Speaker 1: illegal material could be conceived of as an illegal number. 495 00:30:15,840 --> 00:30:17,960 Speaker 1: It might be that the majority of people who see 496 00:30:17,960 --> 00:30:21,240 Speaker 1: that number have no idea why it represents, nor would 497 00:30:21,280 --> 00:30:24,239 Speaker 1: they necessarily know how to go through the process of 498 00:30:24,280 --> 00:30:28,600 Speaker 1: converting that number into whatever the illegal material ultimately is. 499 00:30:29,360 --> 00:30:34,320 Speaker 1: But the argument still stands that if you can successfully 500 00:30:34,360 --> 00:30:38,520 Speaker 1: say that this this number displaying this number is illegal, 501 00:30:39,280 --> 00:30:42,680 Speaker 1: where does that end? How do how do we actually 502 00:30:43,040 --> 00:30:46,000 Speaker 1: have a world that makes sense where you have made 503 00:30:46,680 --> 00:30:53,520 Speaker 1: pure data illegal to distribute or to exhibit. That is 504 00:30:53,600 --> 00:30:59,680 Speaker 1: the the absurdity that's on on display here, and um, yeah, 505 00:30:59,680 --> 00:31:04,400 Speaker 1: it shows how the the worlds of technology, politics, and 506 00:31:04,440 --> 00:31:08,000 Speaker 1: business can come into conflict with one another. And you 507 00:31:08,040 --> 00:31:11,560 Speaker 1: can kind of understand the perspectives of the different parties here, 508 00:31:12,000 --> 00:31:14,840 Speaker 1: but it still doesn't make it any less absurd. So 509 00:31:15,000 --> 00:31:17,080 Speaker 1: I hope you enjoyed this episode. I know it was 510 00:31:17,440 --> 00:31:20,160 Speaker 1: a bit of a convoluted one, but it's important to 511 00:31:20,240 --> 00:31:22,600 Speaker 1: kind of get all these different concepts in your head 512 00:31:23,040 --> 00:31:27,480 Speaker 1: so that you can kind of understand the the challenges 513 00:31:27,520 --> 00:31:32,920 Speaker 1: here when you're trying to balance things like copy protection 514 00:31:34,120 --> 00:31:40,040 Speaker 1: versus the representation of pure information. Um, it does get 515 00:31:40,160 --> 00:31:44,959 Speaker 1: messy and there may not be any simple solution for 516 00:31:45,000 --> 00:31:48,719 Speaker 1: all of this, but I definitely think that prosecuting people 517 00:31:49,160 --> 00:31:52,840 Speaker 1: for demonstrating for you know, showing a number would be 518 00:31:53,080 --> 00:31:57,600 Speaker 1: absolutely ludicrous. Like again, where does that stop. It's entirely 519 00:31:57,640 --> 00:32:01,240 Speaker 1: possible to have something like the with Krmadi. He he 520 00:32:01,280 --> 00:32:05,000 Speaker 1: actually said, if you have a prime number that represents 521 00:32:05,080 --> 00:32:09,720 Speaker 1: ultimately this illegal process, there are legitimate reasons for demons 522 00:32:09,720 --> 00:32:11,680 Speaker 1: for displaying that prime number. They have nothing to do 523 00:32:11,720 --> 00:32:14,440 Speaker 1: with the process, right, It's all about the prime numbers, 524 00:32:15,000 --> 00:32:19,120 Speaker 1: and therefore you cannot make it illegal to display, because 525 00:32:19,160 --> 00:32:21,920 Speaker 1: if you did, then you would invalidate all of these 526 00:32:22,040 --> 00:32:25,920 Speaker 1: legitimate purposes for showing that information, which makes no sense. 527 00:32:26,160 --> 00:32:28,640 Speaker 1: It would be like saying, you know what, uranium is 528 00:32:28,640 --> 00:32:31,720 Speaker 1: a dangerous element, so from now on, you're not allowed 529 00:32:31,720 --> 00:32:34,400 Speaker 1: to show it on the periodic table of elements. Does 530 00:32:34,480 --> 00:32:36,960 Speaker 1: make no sense either, Right, That's kind of what we're 531 00:32:36,960 --> 00:32:40,960 Speaker 1: going at here. Anyway, thank you the Gregorlis for that suggestion. 532 00:32:41,000 --> 00:32:42,480 Speaker 1: It was a lot of fun to go down that 533 00:32:42,600 --> 00:32:46,080 Speaker 1: rabbit hole. And uh, I welcome everyone to send in 534 00:32:46,120 --> 00:32:49,800 Speaker 1: their suggestions for episodes like this. I'm good. Like I said, 535 00:32:49,800 --> 00:32:51,160 Speaker 1: I'm gonna be tackling a few of them in the 536 00:32:51,240 --> 00:32:53,840 Speaker 1: upcoming episodes. The way you can reach out to me, 537 00:32:53,920 --> 00:32:56,600 Speaker 1: there are two ways. One is that you can get 538 00:32:56,640 --> 00:32:59,160 Speaker 1: the I Heart Radio app and you can go to 539 00:32:59,240 --> 00:33:02,120 Speaker 1: the tech stuff page and I Heart Radio app and 540 00:33:02,160 --> 00:33:05,280 Speaker 1: you can use the little microphone talk back feature there, 541 00:33:05,440 --> 00:33:07,200 Speaker 1: which will let you record a message of up to 542 00:33:07,320 --> 00:33:10,920 Speaker 1: thirty seconds in length. And uh, the only people who 543 00:33:10,960 --> 00:33:15,080 Speaker 1: can hear that are Tori and myself, and if we 544 00:33:15,400 --> 00:33:17,200 Speaker 1: you know, if you like, we can even use that 545 00:33:17,280 --> 00:33:20,360 Speaker 1: thirty seconds in an episode to kind of launch into 546 00:33:20,880 --> 00:33:24,120 Speaker 1: whatever the topic suggestion is. Uh, but if you don't 547 00:33:24,120 --> 00:33:26,160 Speaker 1: want that, just let me know and I definitely won't 548 00:33:26,160 --> 00:33:29,440 Speaker 1: play it, but that is a possibility and I love 549 00:33:29,480 --> 00:33:33,000 Speaker 1: hearing from you. I'm gonna be using one of those 550 00:33:33,040 --> 00:33:35,920 Speaker 1: pretty soon, so that's one way. The other way, of course, 551 00:33:35,960 --> 00:33:38,440 Speaker 1: is to reach out via Twitter. The handle for the 552 00:33:38,440 --> 00:33:41,440 Speaker 1: show is text stuff hs W. Just send me a 553 00:33:41,440 --> 00:33:43,520 Speaker 1: message that way. That's how the Gregor List did it, 554 00:33:44,080 --> 00:33:47,280 Speaker 1: and I'll be sure to see that as well. That's 555 00:33:47,320 --> 00:33:50,360 Speaker 1: it for this episode. Hope you enjoyed it and I'll 556 00:33:50,360 --> 00:33:58,600 Speaker 1: talk to you again really soon. Text Stuff is an 557 00:33:58,680 --> 00:34:02,360 Speaker 1: I Heart Radio production. For more podcasts from I Heart Radio, 558 00:34:02,680 --> 00:34:05,840 Speaker 1: visit the I heart Radio app, Apple Podcasts, or wherever 559 00:34:05,960 --> 00:34:12,000 Speaker 1: you listen to your favorite shows. H