Here we'll explore the nexus of legal rulings, Capitol Hill
policy-making, technical standards development, and technological
innovation that creates -- and will recreate -- the networked world as we
know it. Among the topics we'll touch on: intellectual property
conflicts, technical architecture and innovation, the evolution of
copyright, private vs. public interests in Net policy-making, lobbying
and the law, and more.
Disclaimer: the opinions expressed in this weblog are those of the authors and not of their respective institutions.
I agree with Ken Fisher - the big question is what Apple thinks it's doing with this info. They may be thinking they can track the provenance of purchased tunes that "escape" but unless there's a hidden checksum somewhere I can't see how they could show that the embedded account info was genuine.