Drm {And, Or, Vs.} the Law

Total Page:16

File Type:pdf, Size:1020Kb

Drm {And, Or, Vs.} the Law DRM {AND, OR, VS.} THE LAW By Pamela Samuelson opyright industries are hoping that digital rights management (DRM) technologies will prevent infringement of commercially valu- able digital content, including music and movies. These industries have already per- suaded legislatures in the U.S., the European The main purpose Union, and other countries to adopt broad of DRM is not to anti-circumvention rules to protect DRM prevent copyright from being hacked, and courts have inter- preted these statutes even more broadly than the lawmakers infringement but to Cintended. change consumer Some copyright industries now want DRM to be mandated in expectations about all digital media devices, either through standard-setting processes what they are or through legislation. Though mandates for ubiquitous DRM are unlikely to be legislated soon, the threat of DRM mandates should entitled to do with be taken seriously. Computing professionals should be aware that digital content. private standard-setting processes may result in even less protection for consumer and other public interests than legislation that in the past has included at least some consumer-protection rules. U.S. Reps. Rick Boucher (D., VA), Zoe Lofgren (D., CA), and others, recognizing that DRM and overbroad anti-circumvention rules COMMUNICATIONS OF THE ACM April 2003/Vol. 46, No. 4 41 abjure expressing them unless forced to do so by law THE DMCA IMPEDES THE or competition. DRM is more aptly described as “code as code” PROGRESS OF SCIENCE, is [4]—a private governance system in which computer economically unjustifiable, program code regulates which acts users are (or are not) authorized to perform—than as a rights man- and lacks the balance the agement regime or as a copyright-enforcement mech- anism. An alternative phrase for DRM is “digital Constitution requires of restrictions management,” given its use by copyright intellectual property legislation. industries to restrict user rights [3]. Whether users ought to be able to circumvent DRM to exercise their interfere with legitimate interests of consumers, have rights has been the subject of some debate. proposed legislation to safeguard these interests. Computing professionals who want to contribute Anti-Circumvention Rules to more balanced intellectual property policy should In response to industry concern about the vulnera- do two things: collectively articulate the positive bility of DRM technologies to hacking, the U.S. social benefits of general-purpose technologies to Congress in 1998 passed the Digital Millennium counteract proposed DRM mandates; and strongly Copyright Act (DMCA) in order to outlaw certain support consumer-protection legislation for DRM- acts of circumvention and technologies designed to protected content (such as warning labels) and pro- circumvent technical measures used to protect copy- posed reform of anti-circumvention rules. righted works; other countries have followed suit (see Dusollier’s article in this issue). Section DRM Goes Beyond Copyright 1201(a)(1)(A) forbids circumvention of technical DRM is sometimes said to be a mechanism for measures copyright owners use to protect access to enforcing copyrights [9]. While DRM systems can their works. Section 1201(a)(2) forbids manufacture certainly prevent illegal copying and public distribu- or distribution of technologies primarily designed or tion of copyrighted works, they can do far more; produced to circumvent access controls, while paral- they can as easily prevent the copying and distribu- lel provision 1201(b)(1) outlaws other circumven- tion of public-domain works as copyrighted works. tion technologies. Anyone injured by violation of Moreover, even though copyright law confers on these rules can sue for damages, injunctive relief, copyright owners the right to control only public and attorney fees. Violating these rules willfully and performances and displays of these works, DRM for profit is a felony. systems can also be used to control private perfor- Circumvention is permissible for some purposes, mances and displays of digital content. DRM sys- such as achieving program-to-program interoperabil- tems can thwart the exercise of fair use rights and ity and engaging in encryption research and com- other copyright privileges. DRM can be used to puter security testing. However, the statutory compel users to view content they would prefer to exceptions are very drawn narrowly and fail to recog- avoid (such as commercials and FBI warning nize many legitimate reasons for circumventing tech- notices), thus exceeding copyright’s bounds. nical measures, including to engage in research about Given that DRM permits content owners to exer- nonencryption-based watermarking technologies or cise far more control over uses of copyrighted works analyze computer viruses or worms [6]. than copyright law provides, the moniker “DRM” is A careful study of the legislative history of the actually a misnomer. These technologies are not really DMCA and the detailed structure of the anti-circum- about the management of digital “rights” but rather vention rules reveals that Congress intended for cir- about management of certain “permissions” to do X, cumvention of copy- and use-controls to be lawful Y, or Z with digital information. If DRM systems when performed for noninfringing purposes, such as were about digital management of rights, they would to enable fair uses. Circumvention of access controls need to be designed so users could express their rights was treated differently by lawmakers on the theory under copyright, too. Thus far, digital rights expres- that lawful access is a prerequisite for fair use rights. sion languages (RELs) lack semantics to allow the Unfortunately, early decisions interpreting the expression of concepts like fair use [5]. DRM cannot DMCA, such as Universal City Studios v. Corley in accommodate user rights without REL vocabularies 2000, have treated persistent access controls, such as capable of expressing them. Even if RELs developed the Content Scramble System (CSS) used in DVD semantics to express user rights, content owners may players and discs, as access controls. Universal charged 42 April 2003/Vol. 46, No. 4 COMMUNICATIONS OF THE ACM Corley with violating 1201(a)(2) for posting a CSS embed CSS in the licensed DVD players. decryption program known as DeCSS on his 2600 The recording industry hoped to achieve a similar magazine’s Web site as part of its news coverage of the result in negotiations with makers of digital music controversy about DeCSS. By ruling that DeCSS was players through the Secure Digital Music Initiative a 1201(a)(2) tool, not a 1201(b)(1) tool, the court (SDMI), a consortium organized by the major labels implicitly ruled that circumventing CSS to make fair who are members of the Recording Industry Associa- use of a DVD movie violates 1201(a)(1)(A). tion of America and that included representatives of In this and other respects, the Corley decision makers of digital music players. These negotiations adopted the copyright industry’s preferred interpreta- were unsuccessful for a number of reasons, including tion of the DMCA as virtually unlimited in its pro- diverse interests of participants and weaknesses in tection of DRM. Subsequent decisions may correct watermarking technologies SDMI proposed as stan- some errors in the Corley decision, but for now it is a dards. Princeton University computer science profes- benchmark interpretation of the DMCA. sor Edward Felten, along with certain colleagues and Constitutional challenges to DMCA anti-circum- some students, quickly discovered these weaknesses vention rules were unsuccessful in Corley, but many when SDMI challenged the hacker community to scholars of intellectual property law continue to doubt break them (see Felten’s article in this issue). SDMI their constitutionality. Even though the Corley deci- initially tried to suppress publication of Felten’s paper sion might suggest that Carnegie Mellon University about the weaknesses, claiming it was an illegal cir- researcher David Touretzky’s Gallery of CSS cumvention technology. After Felten sought a court Descramblers violates the law, the First Amendment declaration that he had a First Amendment right to of the U.S. Constitution would almost certainly pro- publish, SDMI withdrew its objection. tect his right to post this educational material on his Though the content industry must surely be pleased Web site, as well as my right to link to this gallery on by recent DRM-friendly developments, such as my course Web site. Microsoft’s Palladium initiative and the Trusted Com- Further challenges to the DMCA’s rules may be puting Platform Alliance (TCPA) for embedding DRM fueled by the U.S. Supreme Court’s recent decision in into platform infrastructure, it must also worry about Eldred v. Reno. Even though the Court upheld the three things: Microsoft and TCPA firms cannot control Copyright Term Extension Act (CTEA) of 1998, it every platform for playing, viewing, and copying digital did so because the life of the author plus 70 years was content; competition among different DRMs may frag- still a “limited time,” as the Constitution requires, ment the consumer market and suppress consumer whereas the DMCA anti-circumvention protection is demand; and as Johansen, Felten, and others have perpetual in duration. The CTEA added 20 years to proved, no DRM technology is hacker-proof. the terms of existing copyrights, thereby thwarting the Mandating standard DRM technologies in digital plans of Eric Eldred to publish works from the 1920s media devices would address the first two. Sen. Ernest on the Web. Among the authors whose works are still Hollings (D., SC) introduced the Consumer Broad- in copyright thanks to the CTEA are Bela Bartok, band and Digital Television Promotion Act of 2002 Kahlil Gibran, Robert Frost, and Maurice Ravel. The (S. 2048), contemplating that representatives of copy- DMCA impedes the progress of science, is economi- right industries, makers of digital media devices, and cally unjustifiable, and lacks the balance the Constitu- consumer groups would have 12 months to reach tion requires of intellectual property legislation.
Recommended publications
  • Circular 1 Copyright Basics
    CIRCULAR 1 Copyright Basics Copyright is a form of protection Copyright is a form of protection provided by the laws of the provided by U.S. law to authors of United States to the authors of “original works of authorship” that are fixed in a tangible form of expression. An original “original works of authorship” from work of authorship is a work that is independently created by the time the works are created in a a human author and possesses at least some minimal degree of creativity. A work is “fixed” when it is captured (either fixed form. This circular provides an by or under the authority of an author) in a sufficiently overview of basic facts about copyright permanent medium such that the work can be perceived, and copyright registration with the reproduced, or communicated for more than a short time. Copyright protection in the United States exists automatically U.S. Copyright Office. It covers from the moment the original work of authorship is fixed.1 • Works eligible for protection • Rights of copyright owners What Works Are Protected? • Who can claim copyright • Duration of copyright Examples of copyrightable works include • Literary works • Musical works, including any accompanying words • Dramatic works, including any accompanying music • Pantomimes and choreographic works • Pictorial, graphic, and sculptural works • Motion pictures and other audiovisual works • Sound recordings, which are works that result from the fixation of a series of musical, spoken, or other sounds • Architectural works These categories should be viewed broadly for the purpose of registering your work. For example, computer programs and certain “compilations” can be registered as “literary works”; maps and technical drawings can be registered as “pictorial, graphic, and sculptural works.” w copyright.gov note: Before 1978, federal copyright was generally secured by publishing a work with an appro- priate copyright notice.
    [Show full text]
  • An Introduction to Software Licensing
    An Introduction to Software Licensing James Willenbring Software Engineering and Research Department Center for Computing Research Sandia National Laboratories David Bernholdt Oak Ridge National Laboratory Please open the Q&A Google Doc so that I can ask you Michael Heroux some questions! Sandia National Laboratories http://bit.ly/IDEAS-licensing ATPESC 2019 Q Center, St. Charles, IL (USA) (And you’re welcome to ask See slide 2 for 8 August 2019 license details me questions too) exascaleproject.org Disclaimers, license, citation, and acknowledgements Disclaimers • This is not legal advice (TINLA). Consult with true experts before making any consequential decisions • Copyright laws differ by country. Some info may be US-centric License and Citation • This work is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0). • Requested citation: James Willenbring, David Bernholdt and Michael Heroux, An Introduction to Software Licensing, tutorial, in Argonne Training Program on Extreme-Scale Computing (ATPESC) 2019. • An earlier presentation is archived at https://ideas-productivity.org/events/hpc-best-practices-webinars/#webinar024 Acknowledgements • This work was supported by the U.S. Department of Energy Office of Science, Office of Advanced Scientific Computing Research (ASCR), and by the Exascale Computing Project (17-SC-20-SC), a collaborative effort of the U.S. Department of Energy Office of Science and the National Nuclear Security Administration. • This work was performed in part at the Oak Ridge National Laboratory, which is managed by UT-Battelle, LLC for the U.S. Department of Energy under Contract No. DE-AC05-00OR22725. • This work was performed in part at Sandia National Laboratories.
    [Show full text]
  • Audiences, Gender and Community in Fan Vidding Katharina M
    University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2011 "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding Katharina M. Freund University of Wollongong, [email protected] Recommended Citation Freund, Katharina M., "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding, Doctor of Philosophy thesis, School of Social Sciences, Media and Communications, Faculty of Arts, University of Wollongong, 2011. http://ro.uow.edu.au/theses/3447 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] “Veni, Vidi, Vids!”: Audiences, Gender and Community in Fan Vidding A thesis submitted in fulfilment of the requirements for the award of the degree Doctor of Philosophy From University of Wollongong by Katharina Freund (BA Hons) School of Social Sciences, Media and Communications 2011 CERTIFICATION I, Katharina Freund, declare that this thesis, submitted in fulfilment of the requirements for the award of Doctor of Philosophy, in the Arts Faculty, University of Wollongong, is wholly my own work unless otherwise referenced or acknowledged. The document has not been submitted for qualifications at any other academic institution. Katharina Freund 30 September, 2011 i ABSTRACT This thesis documents and analyses the contemporary community of (mostly) female fan video editors, known as vidders, through a triangulated, ethnographic study. It provides historical and contextual background for the development of the vidding community, and explores the role of agency among this specialised audience community. Utilising semiotic theory, it offers a theoretical language for understanding the structure and function of remix videos.
    [Show full text]
  • Copyright Online Education
    Roadmap Copyright online education April 2018 Education and Student Affairs 1 | Roadmap for Copyright April 2018 Table of content Table of content ....................................................................................2 Introduction .........................................................................................3 Open Education and Licenses ...................................................................4 What you further have to know about Creative Commons .............................6 What is… .............................................................................................7 Flow chart for the use of footage in ..........................................................9 Searching for images, audio or video via CC Search ................................... 10 More websites with new CC footage ........................................................ 11 Attributing works ................................................................................. 12 Copyright and Brightspace .................................................................... 14 Contact .............................................................................................. 16 2 | Roadmap for Copyright April 2018 1. Introduction Education is based on a foundation of sharing. In our education we share knowledge with our students and our fellow teachers. Sharing educational resources openly and offering open and online courses gives others a chance to benefit from the knowledge we teach. In return others can contribute back
    [Show full text]
  • Linux and Free Software: What and Why?
    Linux and Free Software: What and Why? (Qué son Linux y el Software libre y cómo beneficia su uso a las empresas para lograr productividad económica y ventajas técnicas?) JugoJugo CreativoCreativo Michael Kerrisk UniversidadUniversidad dede SantanderSantander UDESUDES © 2012 Bucaramanga,Bucaramanga, ColombiaColombia [email protected] 77 JuneJune 20122012 http://man7.org/ man7.org 1 Who am I? ● Programmer, educator, and writer ● UNIX since 1987; Linux since late 1990s ● Linux man-pages maintainer since 2004 ● Author of a book on Linux programming man7.org 2 Overview ● What is Linux? ● How are Linux and Free Software created? ● History ● Where is Linux used today? ● What is Free Software? ● Source code; Software licensing ● Importance and advantages of Free Software and Software Freedom ● Concluding remarks man7.org 3 ● What is Linux? ● How are Linux and Free Software created? ● History ● Where is Linux used today? ● What is Free Software? ● Source code; Software licensing ● Importance and advantages of Free Software and Software Freedom ● Concluding remarks man7.org 4 What is Linux? ● An operating system (sistema operativo) ● (Operating System = OS) ● Examples of other operating systems: ● Windows ● Mac OS X Penguins are the Linux mascot man7.org 5 But, what's an operating system? ● Two definitions: ● Kernel ● Kernel + package of common programs man7.org 6 OS Definition 1: Kernel ● Computer scientists' definition: ● Operating System = Kernel (núcleo) ● Kernel = fundamental program on which all other programs depend man7.org 7 Programs can live
    [Show full text]
  • Fair Use FAQ for Students
    Fair Use FAQ for Students What is copyright? How is it different from using proper attribution and avoiding plagiarism? Copyright is actually a limited bundle of rights that the government grants to authors of original works such as novels, plays, essays, and movies. For a limited time (currently the life of the author plus 70 years, in most cases), copyright gives the author control over who can copy, distribute, publicly perform or display, or create derivative works (such as sequels or translations) based on their work. The purpose of copyright is to encourage the creation and dissemination of new works for the benefit of the public. Copyright is therefore much broader than the norms against plagiarism. Plagiarism is the presentation of someone else’s work as one’s own; copyright infringement can take place even where the user is honest about the work’s true author. As long as you use proper attribution, plagiarism should not be a worry for you. Copyright is somewhat more complex: unless your use satisfies one of the exceptions or limitations described in the Copyright Act, you cannot use copyright protected material without permission. Fair use is one of the most important limitations to copyright. What is fair use? Fair use is a part of copyright law that allows certain uses of copyrighted works, such as making and distributing copies of protected material, without permission. It evolved over time as judges made case-by-case exceptions to copyright to accommodate uses that seemed legitimate and justifiable regardless of the copyright holder’s apparent rights. Typical early fair uses involved criticism, commentary, and uses in an educational or scholarly context.
    [Show full text]
  • Digital Rights Management, Copyright, and Napster†
    Digital Rights Management, Copyright, and Napster† Nic Garnett* Digital Rights Management technologies in the field of copyright protection should meet four objectives: • give consumers new freedom to enjoy music and other forms of content; • give copyright owners and other value chain participants the means to manage and protect their rights in published works; • implement elements of law, such as copyright exceptions, that ensure that rights are managed in accordance with the public interest; • provide users with the means to manage their legitimate personal rights and interests. We sketch how these goals can be achieved with current technology for peer-to-peer Digital Rights Management (DRM). This technology can ensure the neutrality, security, commercial reliability, and trusted interoperability of applications and services used to protect and manage rights in all forms of information, including creative works protected by copyright. The rapidly evolving area of digital commerce in information requires a framework of commercial trust comparable in scope, and at least as reliable, as the systems of trust that underpin commerce in the physical world. 1. INTRODUCTION Great creators are normally great communicators, their individual voices collectively embodying and expressing the values and passions of their culture. Using digital technology expedites the accurate communication of creators’ works. When employed in the proper context, digital technology can also support the universe of rights associated with most creative works – the rights of creators, value chain members, users, and societal organizations. Although digital technology can greatly enhance the communication of creators’ works, it can also create severe problems. Improperly used digital technology can deny content creators and their successors a commercial return on their labor and the ability to manage and exploit their own property.
    [Show full text]
  • Diverted Derived Design
    Diverted Derived Design Table of Contents Introduction 0 Motivations 1 Licenses 2 Design (as a) process 3 Distributions 4 Economies 5 Propositions 6 This book 7 Glossary 8 2 Diverted Derived Design Introduction The term open source is becoming popular among product designers. We see websites and initiatives appear with a lot of good intentions but sometimes missing the point and often creating confusion. Design magazines and blogs are always rushing into calling an openly published creation open source but rarely question the licenses or provide schematics or design files to download. We are furniture designers, hackers and artists who have been working with free/libre and open source software for quite some time. For us, applying these prirciples to product design was a natural extension, providing new areas to explore. But we also realized that designers coming to this with no prior open source experience had a lot of information to grasp before getting a clear picture of what could be open source product design. So we set ourselves to mobilize our knowledge in this book. We hope that this tool can be a base for teaching and learning about open source product design; a collective understanding of what one should know today to get started and join the movement; a reference students, amateurs and educators can have in their back pocket when they go out to explain what they are passionate about. How to read this book We have divided this book in sections that make sense for us. Each of these tries to address what we think is a general question you might have about open source product design.
    [Show full text]
  • Survey of Additional Ip and Technology Law Developments
    SURVEY OF ADDITIONAL IP AND TECHNOLOGY LAW DEVELOPMENTS I. PATENT DEVELOPMENTS A. HELSINN HEALTHCARE S.A. V. TEVA PHARMS. USA, INC., 855 F.3 D 1356 (FED. CIR. 2017) The United States Court of Appeals for the Federal Circuit held (1) that the asserted claims of the patents-in-suit were subject to an invalidating contract for sale prior to the critical date, (2) that the Leahy-Smith America Invents Act (AIA) did not change the statutory meaning of “on-sale” of the on-sale bar provision of 35 U.S.C. § 102 of the Patent Act, and (3) that public disclosure of the existence of the sale of a patented item may suffice to invalidate a patent under the on-sale bar, even if “the details of the invention” are not “publicly disclosed in the terms of sale.”1 In 2011, Teva Pharmaceuticals USA, Inc. and Teva Pharmaceutical Industries, Ltd. (collectively, “Teva”) filed an Abbreviated New Drug Application (ANDA) seeking FDA approval to market a generic 0.25 mg palonosetron product. Teva’s ANDA filing included a Paragraph IV certification that the claims of the patents-in-suit were invalid and/or not infringed. Helsinn Healthcare S.A. (“Helsinn”) then brought suit under the Hatch-Waxman Act, 35 U.S.C. § 271(e)(2)(A), alleging infringement of the patents-in-suit by the ANDA filing. The four patents-in-suit are directed to intravenous formulations of palonosetron for reducing or reducing the likelihood of chemotherapy-induced nausea and vomiting (CINV), a serious side effect of chemotherapy treatment.2 At trial, Teva argued, inter alia, that the asserted claims were invalid under the on-sale bar provision of 35 U.S.C.
    [Show full text]
  • Guide to Using Public Domain Tools
    Creative Commons makes sharing easy Public domain works are valuable because anyone What is the difference between can freely build upon, enhance, and reuse them for CC0 and the Public Domain Mark? any purposes without restriction under copyright or database law. CC0 (“CC Zero”) is intended for use only That’s why it’s important for creators to have a clear and by authors or holders of copyright and legally robust way to place their works in the public domain as related rights (including database rights), in connection Guide to completely as possible, and it’s also important for publishers with works that are still subject to those rights in one or and archives to have a standardized way to identify works that are already in the public domain. more countries. Creative Commons supports two distinct public domain tools, When CC0 is applied to a work, copyright and related using public rights are relinquished worldwide, making the work free the CC0 Public Domain Dedication and the Public Domain Mark. Creative Commons copyright licenses help authors from those restrictions to the greatest extent possible. manage their copyright on terms they choose. Conversely, CC0 domain tools enables authors and copyright owners who want to dedicate The Public Domain Mark (PDM) is used their works to the worldwide public domain to do so, and PDM to label works that are already free of facilitates the labeling and discovery of works that are already known copyright restrictions. Unlike CC0, PDM doesn’t free of known copyright restrictions. change the copyright status of a work.
    [Show full text]
  • Annex I Definitions
    Annex I Definitions Free and Open Source Software (FOSS): Software whose source code is published and made available to the public, enabling anyone to copy, modify and redistribute the source code without paying royalties or fees. Open source code evolves through community cooperation. These communities are composed of individual programmers and users as well as very large companies. Some examples of open source initiatives are GNU/Linux, Eclipse, Apache, Mozilla, and various projects hosted on SourceForge1 and Savannah2 Web sites. Proprietary software -- Software that is distributed under commercial licence agreements, usually for a fee. The main difference between the proprietary software licence and the open source licence is that the recipient does not normally receive the right to copy, modify, redistribute the software without fees or royalty obligations. Something proprietary is something exclusively owned by someone, often with connotations that it is exclusive and cannot be used by other parties without negotiations. It may specifically mean that the item is covered by one or more patents, as in proprietary technology. Proprietary software means that some individual or company holds the exclusive copyrights on a piece of software, at the same time denying others access to the software’s source code and the right to copy, modify and study the software. Open standards -- Software interfaces, protocols, or electronic formats that are openly documented and have been accepted in the industry through either formal or de facto processes, which are freely available for adoption by the industry. The open source community has been a leader in promoting and adopting open standards. Some of the success of open source software is due to the availability of worldwide standards for exchanging information, standards that have been implemented in browsers, email systems, file sharing applications and many other tools.
    [Show full text]
  • Legal Issues
    LEGAL ISSUES Section Editors: Bruce Strauch (The Citadel) <[email protected]> Jack Montgomery (Western Kentucky University) <[email protected]> Legally Speaking — Librarians, Publishers, and Educators Help out During the Coronavirus Pandemic by Anthony Paganelli (Western Kentucky University) <[email protected]> s a light spring rain falls, I am Samaritans are contributing to aiding those es online or as they distributed printed currently writing this column in need and others are helping the best way copies to students without computers or Ain my home while my wife is that they possibly can. Internet access. Some librarians have conducting a Zoom meeting with her provided information via email, telephone, It was a very difficult situation. Natu- colleagues, and the children are doing video conferencing, websites, and through rally, humans want to be helpful, but when school work on their devices. I joked blogs. The University of Florida has you are told that you could do more harm with them that their new at home school is even created a Coronavirus Library Guide by reaching out and helping, it becomes called the “School of Constant Sorrow.” that has provided information for faculty frustrating and depressing when you can’t. Of course, I thought it was funny, but they regarding copyright as they transitioned However, we are all doing the best we can just rolled their eyes. Now it is called, the their course assignments online. This is a through the knowledge and experiences “Paganelli Learning Academy.” major way librarians are assisting teachers that each of us possess. For instance, and students.
    [Show full text]