My Reply
This was in response to LEGAL NOTICE TO THEJESH GN CEASE AND DESIST INFRINGEMENT.
A container for all my views with excerpts from technology, travel, films, books, kannada, friends and other interests. I am Thejesh GN, friends call me Thej.
by Thejesh GN · June 15, 2015
[…] Our Reply to C&D I received thejeshgn.com/2015/06/15/my-… […]
[…] He said that the intention was to highlight the malicious manner in which this code had been inserted unlawfully into his website, and to educate and inform the general public about it. You can read the entire reply here. […]
[…] was being injected to track its users, has denied any copyright infringement on his part. Thejesh, through his lawyer Lawrence Liang, countered the legal notice by asking for “an unconditional apology” from Flash Networks for […]
[…] represented by the Alternative Law Forum, the blogger has since replied to the cease-and-desist letter. He notes that his decision to publish the code was consistent with industry protocol, refuses […]
[…] was being injected to track its users, has denied any copyright infringement on his part. Thejesh, through his lawyer Lawrence Liang, countered the legal notice by asking for “an unconditional apology” from Flash Networks for violating online […]
[…] Edit (18 June 2015): Lawrence Liang of the Alternative Law Forum has sent out a formal reply to Flash Networks on behalf of Thejesh. In it, he argues that Thejesh is well within his rights because of the provision in Section 52(1)(ac) of the Copyright Act. You can view a copy of the reply on Thejesh’s website here. […]
[…] hat der Blogger, vertreten durch das Alternative Law Forum, auf das Abmahnschreiben reagiert. Er weist darauf hin, dass die Veröffentlichung des Skripts in Übereinstimmung mit den […]
[…] has denied any copyright infringement on his part. Thejesh, through his lawyer Lawrence Liang, countered the legal notice by asking for “an unconditional apology” from Flash Networks for violating online privacy. According to its own website Flash Network also […]
[…] copy of Liang’s reply was uploaded by Thejesh to his website on Monday. The document describes in detail Thejesh’s […]
What is a scam that everyone needs to be warned about?
Nakul your doubt is valid but your analogy is not. Online stuff doesn’t work that way. For exposure of the code company got no issue but the way it is showcased by the techie means what it actually does by telling the truth results into a direct hit t…
[…] copy of Liang’s reply was uploaded by Thejesh to his website on Monday. The document describes in detail Thejesh’s […]
[…] copy of Liang’s reply was uploaded by Thejesh to his website on Monday. The document describes in detail Thejesh’s […]
This site uses Akismet to reduce spam. Learn how your comment data is processed.
There are many ways to subscribe to this blog. Email is probably the best.
Thejesh GN (ತೇಜೇಶ್ ಜಿ.ಎನ್) "Thej" is an Independent Technologist, Hacker, Maker, Traveler, Blogger, InfoActivist, Open data and Open internet enthusiast from Bangalore, India. He loves experimenting with all things life and hence some times he is called hacker and other times duct tape. You can read more about him here. Email [ i @ thejeshgn dot com]. PGP/GPG Keys are here.
Fediverse or Mastodon: @thej@social.thej.in
(C) Thejesh GN.The views expressed on this site are mine (Thejesh GN) alone and do not necessarily reflect the views of my employer. Please read the terms and conditions before reading or commenting on this blog.
best wishes. We are with you.
Salut!
Serves them right!
Befitting reply Thejesh :) Keep up the good work
You may explore the below mentioned points :
As per IT Law 2000 + amendments, “Liabilities of Network Operator” , some of them have been listed below :
* Simply receive data, convert that data into a form consistent with the IP protocol and forward the results to independent computers that in turn provide richer services and interactions.
* ISPs must ensure privacy of communication on their network.
* ISPs must ensure that unauthorized interception of messages does not take place on their networks.
* Definition of Hacking in comparison with the acts done by an ISP ie.
MITM Attacks is an equivalent to “without the consent” – although this point can be contended in the court of law , however the arguments presented in this argument can set
a precedence for future cases.
Secondly, in the court of law it can be contested that there is nothing wrong in inserting “Line Feeds” into the code as in Javascript, as Linefeed doesnt have any impact on the usability/functionality of the code.
http://www.cc.iitd.ernet.in/misc/liability-network-service-providers.pdf
http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&uact=8&ved=0CCoQFjACahUKEwiSmr6p_pXGAhWDe7wKHcAPAME&url=http%3A%2F%2Fwww.bhu.ac.in%2Flawfaculty%2Fblj2006-072008-09%2FBLJ_2007%2F9_Vishwanarthan_Legal_Scenario_Relating_to_the_Role_and_Resp.doc&ei=YgSBVZLhPIP38QXAn4CIDA&usg=AFQjCNGXpUBg-5u4rcHTsPB_WDYr8pAdLA&bvm=bv.96041959,d.dGc
Well done Thejesh. I wonder why the media has not yet picked it up. Could you consider writing to TOI, Airtel is probably going deaf, and none better than Arnab. :-)
Bro let us know how to get rid of this tracker
Wonderful reply. Never let others bend you. If something is wrong, it should be accepted and fixed. That’s how the NA and EU works.
Spying has become a lucrative job these days. Well paid, indeed but we are digging sink holes for everyone. Everyone spying everyone and intellectual mind or humanity will vanish from the universe in short time.
Funny that they see this as infringement, when they are already freely distributing that code “Even without asking” to our mobile devices by inserting it to the source code of websites.
Please can I get your email id. I’m a law student and want to take up this issue.
My email id is alabhya@dhamija.com
Awesome reply, good luck!
Way to go..!!!!! :) :)
Good work Thej.
There many things that these buggers do. We need many voices like you. Keep it up. keep exposing them.
-Vimala AM
Well done Thejesh bhai – we are with you.
as a (ordinary) sw guy from Delhi I am disgusted with Airtel’s behavior– and I salute you for pursuing the matter further instead of backing down.
Am gonna share your reply on FB– and I request you also to create a single-post summary of this matter– which can be shared and which can go viral.
I also request you to have a “subscribe via email” option on your blog– since I personally atleast definitely wanna follow your blog and future posts by you.
Best Wishes and Regards,
Greetings From Delhi,
NS
Thejesh. Respect!
I recently could not disappear altogether your website previous to suggesting that I seriously loved the normal details somebody present with your guests? Will be destined to be yet again routinely to view brand new discussions
Awesome and robust response. I only hope Airtel and Israelis donot say this was inserted for humanitarian reason. I suppose the Israelis should know Indian software professionals cannot be bullied like millions in Gaza
Good work Thej…takes courage and strength of conviction to do what you have done
Also please let us know how to find if other service providers are also doing this kind of underhand injections of malicious code ?
How does one prevent this kind of invasion of one’s privacy ?
Thank you a bunch for sharing this with all folks you really realize what you are speaking about!
Bookmarked. Please also consult with my site =). We will have a link exchange contract between us
Great job getting a reply put together so fast. It’s ridiculous that Airtel would modify the contents of a page in transit.
Did you post the code anywhere else after GitHub removed it?
Vodafone 3G is also inserting their code.
By the way , you have given a great reply.