This message analyzes the Shining Cryptographers network in terms of
how much information Eve the eavesdropper can hope to get by measuring
the photon state before and after it is rotated. See earlier messages
for more detail about how the SC Net works.
This analysis will focus on one
I will make a partial rebuttal to John Gilmore's article on the problems
with content protection schemes.
I distinguish between schemes which are enforced by legislation such
as the Digital Millennium Copyright Act (DMCA), versus schemes which
rely on technological means and market competition
You're missing the document that specifies f8 and f9, which is the glue
between 33.102 and the Kasumi spec. Unfortunately I can't get to their
server at the moment for some reason, so I can't give you it's number, but
I think it is 33.2xx.
thanks and regards,
Greg.
At 01:53 PM 1/19/2001
Excellent essay. I feel smarter for having read it.
I would say that I think that there are some breaks in the clouds
you describe so well.
1) If most of these copy-protection schemes are schemes, and not
laws, then the free market will route around them (The free market
is about as
At 10:10 AM 1/20/01 -0800, [EMAIL PROTECTED] wrote:
This analysis will focus on one particular kind of attack. Eve will make
measurements of the photon polarization angle as it travels through the
network and attempt to deduce information about the signals being sent
by the participants.
This
-BEGIN PGP SIGNED MESSAGE-
At 7:41 AM -0800 on 1/21/01, Somebody wrote:
x-flowedYou've all seen this - I'm just trying to figure out what
I think about at least the part that applies to Apple and iDVD.
I think Gilmore's right.
On the other hand, and, quite frankly, it is the
On Sun, 21 Jan 2001, R. A. Hettinga wrote:
I think Gilmore's right.
On the other hand, and, quite frankly, it is the *market* that
ultimately determines the salability of something, and not government
regulation, or even the litigiousness of the recording industry.
I think the reason we