Re: consulting question.... (DRM)

2009-05-29 Thread John Gilmore
Their product inserts program code into existing applications to make those applications monitor and report their own usage and enforce the terms of their own licenses, for example disabling themselves if the central database indicates that their licensee's

Re: white-box crypto Was: consulting question....

2009-05-29 Thread James Muir
Alexander Klimov wrote: On Tue, 26 May 2009, James Muir wrote: There is some academic work on how to protect crypto in software from reverse engineering. Look-up white-box cryptography. Disclosure: the company I work for does white-box crypto. Could you explain what is the point of

Neat idea

2009-05-29 Thread Jerry Leichter
Using retransmissions for steganography. http://arxiv.org/pdf/0905.0363v3 -- Jerry - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to

white-box crypto Was: consulting question....

2009-05-29 Thread Brecht Wyseur
2009/5/27 Alexander Klimov alser...@inbox.ru mailto:alser...@inbox.ru: On Tue, 26 May 2009, James Muir wrote: There is some academic work on how to protect crypto in software from reverse engineering. Look-up white-box cryptography. Disclosure: the company I work for does white-box crypto.

What will happen to your crypto keys when you die?

2009-05-29 Thread Udhay Shankar N
Fascinating discussion at boing boing that will probably be of interest to this list. http://www.boingboing.net/2009/05/27/what-will-happen-to.html Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The

Re: End-of-chapter questions for Practical Cryptography?

2009-05-29 Thread Your Monkey Overlord
On Fri, May 22, 2009 at 7:55 AM, Perry E. Metzger pe...@piermont.com wrote: may be mistaken but I'm not aware of any significantly superior alternatives. What about Mao's *Modern Cryptography* ? As for Paul's question, maybe we can collaborate as a list on fun questions for readers of

NYT: Pentagon Plans New Arm to Wage Wars in Cyberspace

2009-05-29 Thread Perry E. Metzger
Full article: http://www.nytimes.com/2009/05/29/us/politics/29cyber.html -- Perry E. Metzgerpe...@piermont.com - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to

Re: consulting question.... (DRM)

2009-05-29 Thread Peter Gutmann
Jerry Leichter leich...@lrw.com writes: For the most part, software like this aims to keep reasonably honest people honest. Yes, they can probably hire someone to hack around the licensing software. (There's generally not much motivation for J Random User to break this stuff, since it