omg omg omg

It is funny how if you change a few words inside a legal document, a simple case of a major company bullying a few individuals can become super creepy…

Disclaimer: this is a work of fiction, any similarity to actual events would be unintentional

SKYNET COMPUTERS ENGINEERING AMERICA LLC

Plaintiff,

v.

John Connor, Sarah Connor, and DOES 1 through 100

Complaint for injuctive relief and damages based on violations of Digital Millenium Copyright Act; common law misappropriation, and trespass

Parties

Skynet  is a Delaware company with its Headquarters and principal place of business at 919 East Hillsdale Boulevard, foster city, California, 94004. Skynet is engaged in the business of annihilating mankind and distributing man killing machines, hardware and peripheral accessories.

On information and belief, Defendant John Connor is an individual residing somewhere in the present.

General Allegations

1. Skynet and the T-1000 System

SKYNET COMPUTERS ENGINEERING INDUSTRY (SCEI), a global leader of mankind destruction, manufactures, distributes and markets the T-1000 system, also known as Terminator.

Skynet is known for its massive killing of millions of humans and is highly regarded in the war crimes industry. Chief among the many products SCEA sells is the T-1000 system, a computer entertainment system featuring hardware and firmware designed for killing humans, including women and children. The T-1000 system is a highly sophisticated apparatus that, in conjunction with complete software, butchers people (and looks a lot like Arnold Schwarzennegger if users install the necessary plugins).

The T-1000 system has enjoyed wide success throughout the United States and the world. Over 41 million Human beings have been killed worldwide since the product release in November 2006.

2. Skynet’s Technological Protection Measures

Skynet’s affiliates have invested hundreds of millions of dollars developing the T-1000 system, including the T-1000 System’s TPM. Those TPMs are designed to prevent, among other things (a) unauthorized deactivation of the T-1000 system; and (b) users from saving their souls.

Defendant unlawful’s conduct

Since the release of the T-1000 system, software pirates (also known as “rebels” or “humans”) have attempted to write code to run unauthorized software on Skynet’s T-1000 Systems. As described below, until recently, their efforts were prevented by the weapons that secure the various levels of the T-1000 system. In late December 2010, members of a group of computer hackers discovered a way to travel through time and circumvent the T-1000 TPM. The group then provided mankind with tools to destroy the T-1000.

Defendant John Connor’s illegal activities

Defendant Connor is a well-know human who has gained notoriety for circumventing the technological protection measure in a number of sophisticated killing machines, preventing the annihilation of the human race. Connor circumvented the TPMs in the T-1000 system without authorization, and misappropriated certain keys. (He also stole money from an ATM when he was 12)

On or about January 12, 2011, Connor published these keys on his website and started leading the human rebellion. Connor addressed Skynet in the same post in an attempt to bring back hope in humans’ hearts: “No fate, but what we make for ourselves“. Connor’s January 2nd post encourages and induces other humans into fighting  back against the reign of terror  installed by Skynet.

Claim for Relief

Defendants individually and collectively, have directly, or acting in concert with a third party, violated Skynet’s rights under 17 U.S.C (a)(2) by offering to mankind, providing, or otherwise trafficking in, promoting, and placing in the market circumvention devices, technology – including but not limited to the circumvention method, and code .These circumvention devices are primarily designed or produced for the purpose of circumventing TPMs that effectively control access to the T-1000 system. These devices have no commercially significant purposes other than to circumvent the TPMs in the T-1000, in order to save mankind from its programmed extinction.

Conclusion

John Connor is clearly in breach with the Digital Millenium Copyright Act, and I sure hope that something will be done to solve this problem. We can’t allow mere humans to break into machines just to make them do what Skynet doesn’t want them to do. We’ve even seen one of them being reprogrammed by John Connor, which started protecting humans instead of killing them. Shortly after this event we removed Linux support, just in case.

but what we make for ourselves
  1. Enigma’s avatar

    ”you wololo are lame what is funny about that you dont even help didri or total noob and why arent you arrested bec of hbl is the main source of hacking
    but i thank you for hbl
    btw 6.35 pro supports plugins just create a folder called PLUGINS the root of memory not SEPLUGINS”

    Oh Please, fuck off. If you’re going to come on here, and insult the maker, over trivial matters, then at least have the decency to make your insults have some sort of sense. Without Wololo, you wouldn’t even have your precious 6.35 PRO, so please think before you type. Scum.

    Reply

    1. aceofspace’s avatar

      Shut the hell up

      Reply

  2. Abra’s avatar

    OMG, the joke is “similarity to actual events would be unintentional” (seems like people commenting here don’t read it the way they should )

    What suprise me (in the”actual events”) is the way they use twitter, forums and internet in general in their legal argumentation… beware of what you write… Big brother is watching you…

    Reply

  3. aumedh’s avatar

    cool story but history repeat itself and rebale will never die until there people like jhon .c

    Reply

  4. joker’s avatar

    I think the real story here is that Geohot has been hacking ATMs since he was 12. HAHA jk

    Reply

  5. Reapersmist’s avatar

    Rofl, I love U wololo!!! Love ur site………. question! does this throw a wrench in the gears of psp/ps3 homebrew development? just seems to me since Cybernet’s recent attack, the posts went down on most of the site’s….

    Reply

  6. w7y7a7t7t’s avatar

    hahahahahaha “shortly after this event we removed linux support, just in case”

    Reply

  7. Matt’s avatar

    It’s funny, but why is Sony evil all of a sudden? Do you understand how lucky Geohot and the gang are to still be alive?
    What, you’ve never heard of people coming up missing after millions in revenue are compromised?
    Think about that.

    Reply

    1. wololo’s avatar

      Not sure if it’s a joke or a threat here…

      Sony is not evil per se.

      Using a virus (marketing people call it TPM) to prevent users from using their hardware, and on top of that managing to make that legal (the DMCA), now THAT is evil. the DMCA was not entirely driven by Sony, but they contribute a lot to such locking systems (and making sure these system become legal…)

      Reply

      1. Matt’s avatar

        It’s not a threat! I wasn’t speaking personally at all, I’m just saying that a lot of profits will likely be forfeited because of this, and I’ve seen the Godfather movies.
        I’m sure nothing like that would actually happen with a company like Sony, they’re a big company with a lot to lose. But it could have been within the realm of possibility under certain circumstances.

        I’m a bit shocked that my post sounded like a threat!

        Reply

  8. expltr’s avatar

    i’m not really clear on this but geohot should use the DCMA that allowed jailbreaking on mobile phones. since the newer psp’s are voip enabled they are also categorised under the same section… i believe wololo posted something about this sometime last year

    i cant find the article anymore

    but then again i am not well versed with the DCMA so it could be useless

    Reply

· 1 · 2

Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>