Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
Berkman Center for Internet & Society
 Chilling Effects Clearinghouse > Trademark > Notices > DMCA and Defamation Complaint to Stack Exchange (NoticeID 1298553, http://chillingeffects.org/N/1298553) Location: https://www.chillingeffects.org/notice.cgi?NoticeID=1298553

DMCA and Defamation Complaint to Stack Exchange

April 19, 2013

 

Sender Information:
CipherCloud, Inc.
Sent by:
Senior Corporate Counsel


San Jose, CA, 95113, United States

Recipient Information:

Stack Exchange, Inc.


New York, NY, 10038, United States


Sent via: Courier and email
Re: DMCA Notice - Notice of False/Misleading/Defamatory Statements

RE: DMCA Notice - Notice of False/Misleading/Defamatory Statements

To Whom It May Concern.

My name is [redacted]. and I am Senior Corporate Counsel for lnc. On behalf of CipherCloud, I am providing notice in this letter that a question/answer posting on a website hosted by Stack Exchange, Inc. (http://crypto.stackexchange.com/questions/3645/how-is-ciphercloud-doing-homomorphic-encryption) (the "Webpage") includes repeated infringements of CipherCloud intellectual property, including copyright and trademark. ln addition to the DMCA Notice, I am providing samples of false, misleading and defamatory
statements made by Subscribers on the Webpage. Both activities are violations of law and Stack Exchange's Terms of Service.

DMCA NOTICE COPYRIGHT INFRINGEMENT

VIOLATION I

The original image, to which CipherCloud owns the exclusive copyright and includes a CipherCloud trademark, is a screen capture from a slide deck produced and presented by CipherC|oud’s CEO for the 2011 Defense Science Board Task Force on Cyber-Security and Reliability in a Digital Cloud. Images from the original slide deck are attached to this letter. Specifically, note the second image attached to the end of this letter, which is slide four (4) from the slide deck.

The unauthorized and infringing copy of that image is in a post from CodeslnChaos (originally posted 25.August.2012 at 15:31 and edited 25.August.2012 at 15:50). The image is found on the Webpage and is hosted through Stack Exchange's account with Imgur LLC at:

http://i.stack.imgur.com/xJ6V8.png

VIOLATION II

The original image, to which CipherCloud owns the exclusive copyright, is a screen capture that can be found at the 2:30 mark of the following video:

http://pages.cipercloud.com/AnyAppfiveminutesdemo.html?alild=1

The unauthorized and infringing copy of that image is in a post from Sid (originaliy posted 25.August.2012 at 23:12 and edited 13.March.2013 at 1624). The image is found on the Webpage and is hosted through Stack Exchange's account with Imgur LLC at:

http://i.stack.imgur.com/h7ntP.jpg

VIOLATION III

The original image, to which CipherCloud owns the exclusive copyright, is a screen capture that can be found at the 2:53 mark of the following video:

http://pages.ciphercloud.com/AnyAppfiveminutesdemo.html?alild=1

The unauthorized and infringing copy of that image is linked in a post from adrenalion (originally posted 18.March.2013 at 1638). In the post, adrenalion even states that they “...snapped a copy of one screen after the response from John is entered and encrypted, and have attached an image below (apologies for the crude highlighting)..." The link to the image is found on the Webpage and is hosted through Stack Exchange's account with imgur LLC at:

http://i.stack.imgur.com/oBXZJ.jpg

This letter is official notification under Section 512(c) of the Digital Millennium Copyright Act ("DMCA”}, and I seek the removal of the aforementioned infringing material from your servers. Please also be advised that law requires you, as a service provider, to remove or disable access to the infringing materials upon receiving this notice. Under US law a service provider, such as yourself, enjoys immunity from a copyright lawsuit provided that you act with deliberate speed to investigate and rectify ongoing copyright infringement.

l am providing this notice in good faith and with the reasonable belief that use of the image in the manner complained of is not authorized by CipherCloud, its agent(s) or by law. Under penalty of perjury l certify that the information contained in the notification is both true and accurate, and l have the authority to act on behalf of the owner of the copyright involved.

STACK EXCHANGE TERMS OF SERVICE - FALSE AND MISLEADING STATEMENT

The postings from CodeslnChaos, adrenalion (including their original account as AdrenaLion), Sid and D.W. all include admissions that the individual offering an "answer" does not know the facts of CipherCloud functionality. Some examples from the Subscriber's own postings include:

(1) "I'm not sure..."
(2) “I don’t even think...”
(3) “l don't know how..."
(4) “l have not had time to fully explore this..."

Following these admissions, the Subscribers then make claims of fact that are false, misleading or libelous. We do recognize the purpose of some Subscribers is to defame CipherCloud while purporting to offer crypto information. For example, your Subscriber Sid is with a CipherCloud competitor as CEO of CipherDB (http://www.linkedin.com/in/sidshetye).

Beyond incorporating defamatory statements, such as “snake oil” or "cost with no benefit" as just two examples, the Subscribers make repeated statements purported as fact that can be ascertained as false by viewing publicly available information on CipherCloud's website (http://www.ciphercloud.com/). Such false. misleading and
defaming statements include the following sample:

(1) “The scheme is deterministic and format preserving."
- CipherCIoud’s product is NOT deterministic.

(2) “If the same string gets encrypted in different places, an attacker can see that the same string was used in both places."
- Again, CipherCloud's product is NOT deterministic.

(3) “To make this possible, you must ensure that the same string gets encrypted the same way every time."
- This is a false statement about CipherCloud functionality. And again, CipherCloud's product is NOT deterministic.

(4) “As CodeslnChaos suggested in an earlier answer, this makes the solution extremely vulnerable to frequency-analysis attacks."
- The referenced scheme does NOT represent CipherCIoud functionality. In fact, CipherCloud has patent pending mechanisms to defeat frequency-analysis attacks.

(5) "This probably explains why they do not have, and are not even in process to obtain, FIPS 140-2 validation, which pertains to the proper implementation of an approved algorithm.”
- This Statement is patently false. CipherCloud is in process for FIPS 104-2 Certification as can be ascertained on the publicly available NIST website.

(6) “Would you entrust your data to what amounts to XOR?"
- XOR is only one of the schemes CipherCloud offers, but this statement from AdrenaLion is part of an assertion that it is CipherCloud's only offering.

(7) “Basically they end up with a 1:1 mapping of lower case words."
- The statement is patently false. Sid implies that what was perceived from a public demo is CiperCloud's product offering. CipherCloud does not incorporate 1:1 mapping.

(8) "There is no security. AES is misleading/wrong (ECB + O/constant padding + O/constant IV => simple 1:1 mapping why don't you just rotate the bits and call it a day!)"
- CipherCloud does not use ECB, constant iV or 1:1 mapping. Even more concerning is the statement that CipherCloud offer "no security” in its product.

(9) "Vendor lockin - | don't know if they supply migration tools because if you one day decide to upgrade to real security from their "secure" offering, you can't. Because their box/gateway is the only one that would know these 1:1 mappings. Unless you want to formalize hacking yourself as the official upgrade and data extraction path.”
- The Statement is simply false, and Sid even admits "I don't know" before going into all of the false Statements.

(10) “What Ciphercloud appears to be doing is not random, therefore it is not truly encryption, and certainly not homomorphic encryption."
-CipherCloud’s products ARE based on panted pending randomization. Again, this is a patently false statement intended to defame CipherCloud and CipherCloud products.

The dissemination of false and misleading statements subjects parties, among other things, to claims as a violation of the Lanham Act §43(a) [15 U.S.C. §1125] and California Business and Professions Code §17200 et seq. for unfair competition by a competitor. Furthermore, posting such statements is a violation of CAL. ClV. CODE 43 as defamation. I also note that posting statements that are libelous, defamatory or violate the law is a violation of Section 3 in Stack Exchanges Terms of Service.

Please be advised that CipherCloud is taking this matter very seriously. CipherCloud demands that Stack Exchange act with deliberate speed to remove the Webpage and notify the Subscribers of their violations of Stack Exchange's Terms of Service. CipherCloud further requests that you respond to this letter within ten (10) days
and provide written assurances that you will take all steps necessary to correct the violations of law and CipherCloud intellectual property rights.

By this letter. CipherCloud reserves all of its rights and claims against Stack Exchange. Nothing in this letter shalt be deemed a waiver of any kind by CipherCloud. You are now on notice of the possibility of formal legal proceedings regarding this matter, and are therefore required to preserve all documents pertaining to this matter, whether such documents exist in electronic form or hard copy.

We look forward to hearing from you or your counsel concerning this matter. Should anyone from Stack Exchange wish to discuss this with me, please contact me directly at:

Attn: [redacted]
Senior Corporate Counsel
CipherCloud, Inc.
[redacted]
San Jose, CA 95113
[redacted] (phone)
[redacted]@ciphercioud.com

Thank you in advance for your prompt attention to this matter.

Sincerely,

[redacted], JD

attachment

FAQ: Questions and Answers

[back to notice text]


Question: Why does a web host or blogging service provider get DMCA takedown notices?

Answer: Many copyright claimants are making complaints under the Digital Millennium Copyright Act, Section 512(c)m a safe-harbor for hosts of "Information Residing on Systems or Networks At Direction of Users." This safe harbors give providers immunity from liability for users' possible copyright infringement -- if they "expeditiously" remove material when they get complaints. Whether or not the provider would have been liable for infringement by materials its users post, the provider can avoid the possibility of a lawsuit for money damages by following the DMCA's takedown procedure when it gets a complaint. The person whose information was removed can file a counter-notification if he or she believes the complaint was erroneous.

Question: What does a service provider have to do in order to qualify for safe harbor protection?

Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions.

In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)]

Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)].


Question: What are the provisions of 17 U.S.C. Section 512(c)(3) & 512(d)(3)?

Answer: Section 512(c)(3) sets out the elements for notification under the DMCA. Subsection A (17 U.S.C. 512(c)(3)(A)) states that to be effective a notification must include: 1) a physical/electronic signature of a person authorized to act on behalf of the owner of the infringed right; 2) identification of the copyrighted works claimed to have been infringed; 3) identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed; 4) information reasonably sufficient to permit the service provider to contact the complaining party (e.g., the address, telephone number, or email address); 5) a statement that the complaining party has a good faith belief that use of the material is not authorized by the copyright owner; and 6) a statement that information in the complaint is accurate and that the complaining party is authorized to act on behalf of the copyright owner. Subsection B (17 U.S.C. 512(c)(3)(B)) states that if the complaining party does not substantially comply with these requirements the notice will not serve as actual notice for the purpose of Section 512.

Section 512(d)(3), which applies to "information location tools" such as search engines and directories, incorporates the above requirements; however, instead of the identification of the allegedly infringing material, the notification must identify the reference or link to the material claimed to be infringing.


Question: Does a service provider have to follow the safe harbor procedures?

Answer: No. An ISP may choose not to follow the DMCA takedown process, and do without the safe harbor. If it would not be liable under pre-DMCA copyright law (for example, because it is not contributorily or vicariously liable, or because there is no underlying copyright infringement), it can still raise those same defenses if it is sued.


Question: How do I file a DMCA counter-notice?

Answer: If you believe your material was removed because of mistake or misidentification, you can file a "counter notification" asking the service provider to put it back up. Chilling Effects offers a form to build your own counter-notice.

For more information on the DMCA Safe Harbors, see the FAQs on DMCA Safe Harbor. For more information on Copyright and defenses to copyright infringement, see Copyright.


Topic maintained by Berkman Center for Internet & Society

Chilling Effects Clearinghouse - www.chillingeffects.org
Chilling Effects Clearinghouse page printed from: https://www.chillingeffects.org/notice.cgi?NoticeID=1298553
disclaimer / privacy / about us & contacts