Knowledge (XXG)

Inline linking

Source 📝

322:
for purposes of the Copyright Act. In other words, Google does not have any "material objects...in which a work is fixed...and from which the work can be perceived, reproduced, or otherwise communicated" and thus cannot communicate a copy. Instead of communicating a copy of the image, Google provides HTML instructions that direct a user's browser to a website publisher's computer that stores the full-size photographic image. Providing these HTML instructions is not equivalent to showing a copy. First, the HTML instructions are lines of text, not a photographic image. Second, HTML instructions do not themselves cause infringing images to appear on the user's computer screen. The HTML merely gives the address of the image to the user's browser. The browser then interacts with the computer that stores the infringing image. It is this interaction that causes an infringing image to appear on the user's computer screen. Google may facilitate the user's access to infringing images. However, such assistance raised only contributory liability issues and does not constitute direct infringement of the copyright owner's display rights. ...While in-line linking and framing may cause some computer users to believe they are viewing a single Google webpage, the Copyright Act...does not protect a copyright holder against acts....
243: 297:
with some custom complex server side scripting to allow hotlinking for a short time, or in more complex setups, to allow the hotlinking but return an alternative image with reduced quality and size and thus reduce the bandwidth load when requested from a remote server. All hotlink prevention measures
321:
Google does not...display a copy of full-size infringing photographic images for purposes of the Copyright Act when Google frames in-line linked images that appear on a user's computer screen. Because Google's computers do not store the photographic images, Google does not have a copy of the images
146:
An article on one site may choose to refer to copyrighted images or content on another site via inline linking, which may avoid rights and ownership issues that copying the original files could raise. However, this practice is generally discouraged due to resulting bandwidth loading of the source,
306:
The most significant legal fact about inline linking, relative to copyright law considerations, is that the inline linker does not place a copy of the image file on its own Internet server. Rather, the inline linker places a pointer on its Internet server that points to the server on which the
275:
to detect hotlinking and return a condemnatory message, commonly in the same format, in place of the expected image or media clip. Most servers can be configured to partially protect hosted media from inline linking, usually by not serving the media or by serving a different file.
118:
It is copyright infringement to make copies of a work for which the person making copies has no license, but there is no infringement when the re-user provides a simple text link within an HTML document that points to the location of the original image or file (simply called a
162:
script on the ad server, including a string uniquely identifying the site producing the traffic, and possibly other information about the person viewing the ad, previously collected and associated with a cookie. The CGI script determines which image to send in response to the
307:
proprietor of the image has placed the image file. This pointer causes a user's browser to jump to the proprietor's server and fetch the image file to the user's computer. US courts have considered this a decisive fact in copyright analysis. Thus, in
192:
Inline linking to an image stored on another site increases the bandwidth use of that site even though the site is not being viewed as intended. The complaint may be the loss of ad revenue or changing the perceived meaning through an unapproved
122:
Web architects may deliberately segregate the images of a site on one server or a group of servers. Hosting images on separate servers allows the site to divide the bandwidth requirements between servers. As an example, the high-volume site
286:) to reject or redirect attempted hotlinks to images and media to an alternative resource. Most types of electronic media can be redirected this way, including video files, music files, and animations (such as 221:
in the code that interprets the objects. When an object is stored on an external server, the referring site has no control over if and when an originally beneficial object's content is replaced by malicious
79:
When a website is visited, the browser first downloads the textual content in the form of an HTML document. The downloaded HTML document may call for other HTML files, images, scripts and/or
64:) is the use of a linked object, often an image, on one site by a web page belonging to a second site. One site is said to have an inline link to the other site where the object is located. 185:
The blurring of boundaries between sites can lead to other problems when the site violates users' expectations. Other times, inline linking can be done for malicious purposes.
314: 91:
which allow images to display on the page. The HTML code generally does not specify a server, meaning that the web browser should use the same server as the parent code (
332: 147:
and the source provider is often offended because the viewer is not seeing the whole original page, which provides the intended context of the image.
176:
show how many times a page has been loaded. Several companies provide hit counters that are maintained off site and displayed with an inline link.
255:
Most web browsers will blindly follow the URL for inline links, even though it is a frequent security complaint. Embedded images may be used as a
76:(HTTP), does not make any distinction of types of links—all links are functionally equal. Resources may be located on any server at any location. 372:
Some webmasters will try to directly link to your images from their pages. Luckily, a simple configuration change provides the necessary fix.
309: 154:. Banner ads are images hosted by a company that acts as middleman between the advertisers and the websites on which the ads appear. The 102:
When a browser downloads an HTML page containing such an image, the browser will contact the remote server to request the image content.
206:
Pay-per-content services may attempt to restrict access to their content through complex scripting and inline linking techniques.
490: 80: 73: 242: 505: 159: 88: 495: 110:
The ability to display content from one site within another is part of the original design of the Web's
189:
Content sites where the object is stored and from which it is retrieved may not like the new placement.
230: 229:
information. This leaks information about the browsed pages to the servers hosting the objects (see
196: 31: 407: 360: 500: 283: 214: 451: 385: 210: 203:
attacks may include inline links to a legitimate site to gain the confidence of a victim.
484: 294: 279: 226: 337: 272: 260: 246:
A placeholder image used when attempting to hotlink to a website which disallows it
218: 429: 287: 173: 169: 95:). It also permits absolute URLs that refer to images hosted on other servers ( 17: 151: 166:
Some websites hotlink from a faster server to increase client loading speed.
111: 452:"Image quality degradation as a hotlink prevention measure and deterrent" 200: 124: 30:"Hotlink" redirects here. For the Malaysian prepaid mobile service, see 256: 298:
risk deteriorating the user experience on the third-party website.
241: 317:
explained why inline linking did not violate US copyright law:
259:
to track users or to relay information to a third party. Many
263:
browser tools will restrict this behavior to varying degrees.
386:"Is Inline Linking To An Image Copyright Infringement?" 27:
Use of a linked object on one web page to a second site
97:<img src="http://www.example.com/picture.jpg" /> 315:
United States Court of Appeals for the Ninth Circuit
225:
The requests for inline objects usually contain the
354: 352: 83:files to be processed. These files may contain 72:The technology behind the World Wide Web, the 333:Copyright aspects of hyperlinking and framing 8: 302:Copyright issues raised by inline linking 450:Aleksandersen, Daniel (30 August 2016). 131:, individual stories on servers such as 348: 271:Some servers are programmed to use the 139:, and serves images for each host from 282:is often used (e.g., mod_rewrite with 209:Inline objects can be used to perform 430:"Smarter Image Hotlinking Prevention" 7: 310:Perfect 10, Inc. v. Amazon.com, Inc. 181:Controversial uses of inline linking 25: 293:Other solutions usually combine 384:Mike Masnick (6 January 2010). 93:<img src="picture.jpg" /> 406:Thomas C Greene (2007-02-20). 1: 475:487 F.3d 701 (9th Cir. 2007). 114:medium. Common uses include: 106:Common uses of linked content 428:Thomas Scott (2004-07-13). 359:Ross Shannon (2007-02-26). 158:tag may specify a URL to a 127:stores its "front page" at 74:Hypertext Transfer Protocol 522: 29: 408:"Vista Security Oversold" 150:Many web pages include 68:Inline linking and HTTP 324: 247: 87:tags which supply the 319: 245: 491:Internet terminology 363:. yourhtmlsource.com 231:web visitor tracking 197:Cross-site scripting 32:Maxis Communications 410:. theregister.co.uk 273:HTTP referer header 141:images.slashdot.org 54:offsite image grabs 284:Apache HTTP Server 248: 133:games.slashdot.org 361:"Bandwidth Theft" 16:(Redirected from 513: 476: 473: 467: 466: 464: 462: 447: 441: 440: 438: 437: 432:. alistapart.com 425: 419: 418: 416: 415: 403: 397: 396: 394: 393: 381: 375: 374: 369: 368: 356: 211:drive-by attacks 157: 142: 138: 134: 130: 98: 94: 86: 40:(also known as 21: 521: 520: 516: 515: 514: 512: 511: 510: 506:Internet ethics 481: 480: 479: 474: 470: 460: 458: 449: 448: 444: 435: 433: 427: 426: 422: 413: 411: 405: 404: 400: 391: 389: 383: 382: 378: 366: 364: 358: 357: 350: 346: 329: 304: 269: 253: 240: 183: 155: 140: 137:it.slashdot.org 136: 132: 128: 108: 96: 92: 84: 70: 58:bandwidth theft 35: 28: 23: 22: 18:Bandwidth theft 15: 12: 11: 5: 519: 517: 509: 508: 503: 498: 493: 483: 482: 478: 477: 468: 442: 420: 398: 376: 347: 345: 342: 341: 340: 335: 328: 325: 303: 300: 268: 265: 252: 249: 239: 236: 235: 234: 223: 207: 204: 194: 190: 182: 179: 178: 177: 167: 164: 148: 144: 120: 107: 104: 69: 66: 50:direct linking 38:Inline linking 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 518: 507: 504: 502: 499: 497: 494: 492: 489: 488: 486: 472: 469: 457: 456:Slight Future 453: 446: 443: 431: 424: 421: 409: 402: 399: 387: 380: 377: 373: 362: 355: 353: 349: 343: 339: 336: 334: 331: 330: 326: 323: 318: 316: 312: 311: 301: 299: 296: 295:URL rewriting 291: 289: 285: 281: 280:URL rewriting 277: 274: 266: 264: 262: 258: 250: 244: 237: 232: 228: 224: 220: 217:, exploiting 216: 212: 208: 205: 202: 198: 195: 191: 188: 187: 186: 180: 175: 171: 168: 165: 161: 153: 149: 145: 126: 121: 117: 116: 115: 113: 105: 103: 100: 90: 82: 77: 75: 67: 65: 63: 59: 55: 51: 47: 46:piggy-backing 43: 39: 33: 19: 496:File sharing 471: 459:. Retrieved 455: 445: 434:. Retrieved 423: 412:. Retrieved 401: 390:. Retrieved 379: 371: 365:. Retrieved 338:Deep linking 320: 308: 305: 292: 278: 270: 261:ad filtering 254: 184: 174:Web counters 170:Hit counters 129:slashdot.org 109: 101: 78: 71: 61: 57: 53: 49: 45: 41: 37: 36: 461:1 September 267:Server side 251:Client side 156:<img> 85:<img> 485:Categories 436:2007-11-16 414:2007-11-16 392:2014-02-15 388:. Techdirt 367:2007-11-16 344:References 238:Prevention 152:banner ads 81:stylesheet 42:hotlinking 501:Hypertext 112:hypertext 327:See also 227:referrer 222:content. 201:phishing 193:context. 163:request. 125:Slashdot 119:"link"). 62:leeching 257:web bug 213:on the 313:, the 219:faults 215:client 60:, and 288:Flash 463:2016 199:and 89:URLs 290:). 172:or 160:CGI 135:or 99:). 487:: 454:. 370:. 351:^ 233:). 56:, 52:, 48:, 44:, 465:. 439:. 417:. 395:. 143:. 34:. 20:)

Index

Bandwidth theft
Maxis Communications
Hypertext Transfer Protocol
stylesheet
URLs
hypertext
Slashdot
banner ads
CGI
Hit counters
Web counters
Cross-site scripting
phishing
drive-by attacks
client
faults
referrer
web visitor tracking

web bug
ad filtering
HTTP referer header
URL rewriting
Apache HTTP Server
Flash
URL rewriting
Perfect 10, Inc. v. Amazon.com, Inc.
United States Court of Appeals for the Ninth Circuit
Copyright aspects of hyperlinking and framing
Deep linking

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.