Their product inserts program code into
existing applications to make those applications monitor and report
their own usage and enforce the terms of their own licenses, for
example disabling themselves if the central database indicates that
their licensee's
Alexander Klimov wrote:
On Tue, 26 May 2009, James Muir wrote:
There is some academic work on how to protect crypto in software from
reverse engineering. Look-up white-box cryptography.
Disclosure: the company I work for does white-box crypto.
Could you explain what is the point of
Using retransmissions for steganography.
http://arxiv.org/pdf/0905.0363v3
-- Jerry
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to
2009/5/27 Alexander Klimov alser...@inbox.ru mailto:alser...@inbox.ru:
On Tue, 26 May 2009, James Muir wrote:
There is some academic work on how to protect crypto in software from
reverse engineering. Look-up white-box cryptography.
Disclosure: the company I work for does white-box crypto.
Fascinating discussion at boing boing that will probably be of interest
to this list.
http://www.boingboing.net/2009/05/27/what-will-happen-to.html
Udhay
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The
On Fri, May 22, 2009 at 7:55 AM, Perry E. Metzger pe...@piermont.com wrote:
may be mistaken but I'm not aware of any significantly superior
alternatives.
What about Mao's *Modern Cryptography* ?
As for Paul's question, maybe we can collaborate as a list on fun
questions for readers of
Full article:
http://www.nytimes.com/2009/05/29/us/politics/29cyber.html
--
Perry E. Metzgerpe...@piermont.com
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to
Jerry Leichter leich...@lrw.com writes:
For the most part, software like this aims to keep reasonably honest
people honest. Yes, they can probably hire someone to hack around the
licensing software. (There's generally not much motivation for J
Random User to break this stuff, since it