Automated analysis is probably the better way to figure out what Web sites are hostile. Robots are just staggeringly more efficient at these tasks. |
I have concluded that 180's business model is fundamentally broken -- that 180 cannot implement technology or enforcement to assure the proper installation of its software. Accordingly, just as CDT [Center for Democracy & Technology] terminated its discussions with 180, I have resolved not to tell 180solutions which specific distributor was responsible for this installation. |
It's very easy to hack S3. It just takes one line of code. |
Packet logs and the video together are overwhelming proof. |
Revenue sources is the area where I am most excited about and focused on right now. How do these programs make money? Who buys these ads? |
Someone needs to examine popular Web sites to figure out which are untrustworthy. Then users' computers need to automatically notify them before users reach untrustworthy sites. |
That's a public relations defense, not a legal defense. |
That's not a compelling legal defense. The fact that you've stopped doing something is not a defense. |
The advertisers need to be aware that they are not getting their money's worth -- they have a contract that said they are paying for one thing and they are getting another. |
The promise of the platform is that thousands of distributors would be unable to cheat 180Solutions and 180 users. |