• 0 Posts
  • 5 Comments
Joined 3 years ago
cake
Cake day: June 13th, 2023

help-circle
  • I’m confused about that too.

    InterDigital seems to claim that the patent in question is about dynamically overlaying multiple video streams e.g. from https://ir.interdigital.com/news-events/press-releases/news-details/2025/InterDigital-awarded-injunction-against-Disney-by-German-court-5ad043c60/default.aspx

    The Munich Regional Court ruled that InterDigital is entitled to an injunction over Disney’s infringement of an InterDigital patent related to the streaming of video content using high dynamic range (HDR) technology. Disney can appeal the decision.

    The judgment from the Munich court follows a separate decision from the same court to award InterDigital an injunction over Disney’s infringement of a patent which enables a method for dynamically overlaying a first video stream with a second video stream. It also follows a decision by a court in Brazil, to grant a preliminary injunction in InterDigital’s favor, after the court found that Disney infringed both of the InterDigital patents-in-suit.

    What’s interesting is that HDR10 is still available on Disney supposedly. So it sort of sounds like the claim is that Disney is adding DV with HDR10+ fallback dynamically during the video stream… and maybe regular HDR is pre-generated by Disney hence is not affected by the patent. The solution might be to always have multiple pre-generated copies of video before the stream even takes place…that would be a lot of extra storage space Disney would need!



  • From the posted link

    In a lengthy statement released over the weekend, the StopICE team rejected claims that any personal user data was exposed or handed over to authorities. According to them, the platform does not collect names, addresses, or precise GPS coordinates from its users. Instead, it uses anonymized polar coordinate calculations based on ZIP codes to trigger location-based alerts.

    The statement also attributes the attempted breach to a personal server allegedly tied to a Customs and Border Protection (CBP) agent in Southern California. The attackers reportedly tried to inject false alerts into the system but were unsuccessful, the platform says, due to countermeasures and quick isolation of the attack vector. The operators claim the attackers fell for “bait” in the form of fake data and API keys, enabling StopICE to trace their networks and even publish associated IP addresses and phone numbers.

    StopICE further downplayed the scale of the incident, claiming the only exposure involved temporary file names after a backend management tool update modified security headers, an issue they say was minor and resolved swiftly.

    Keep in mind StopICE is a website, not an app, so some of the stuff the hackers claimed they got don’t seem to make sense. The only “personal” info I see the website could collect is a phone number if you sign up for text alerts when someone posts an alert at a zip code / city / state.


  • Not too different vs IPFS, essentially the IPFS network if it was using WebTorrent. Both rely on swarms of p2p users/servers to seed/pin data to keep it online.

    I’m not too familiar with Veilid but that does seem different since it’s built for privacy so I doubt all the peers are public in that scenario. There is nothing private about IPFS or WebTorrent, all peer IP addresses are public in their respective swarms.