Bill Stewart wrote:
These days nobody *has* a better cryptosystem than you do They might
have a cheaper one or a faster one, but for ten years the public's
been able to get free planet-sized-computer-proof crypto ...
I seem to remember that the Nazis said the same thing about Enigma.
Even when
Scott G. Kelly wrote:
I seem to recall reading somewhere that there is some issue with
directly encrypting data with an RSA public key, perhaps some
vulnerability, but I can't find any reference after a cursory look.
There are a few different ones, some simple and some complex. First of
all,
Matt Blaze wrote:
Huh? DVD region coding doesn't prevent this at all; ripped decrypted
DVD mpeg files could be played anywhere.
I think that DRM mechanisms may increase piracy. A few years ago you
could buy a CD, knowing that it was a standard product which you could
use in certain ways.
Alan wrote:
Another argument for the regions is the differing formats for TV
signals. (NTSC v.s. PAL.) It is a bogus argument as you can find DVD
players that will convert the signal with little or no problem.
Actually my TV is happy with either. I always had the notion that I
wouldn't be
Eric Rescorla wrote:
No, this isn't true. Say that Americans are willing to pay 50% more
for DVDs than Europeans. It would make sense for producers to attempt
to segment the market.
You are right that producers would want to segment the market, but we
have no reason to introduce extra laws to
John S. Denker wrote:
Note that in the absence of market segmentation,
the society as a whole is worse off.
I see what you mean, but do you think it applies to DVDs? The
segmentation needs to be in each market, between rich and poor
consumers. What we actually have is segmentation between
Anonymous wrote:
As far as Freenet and MojoNation, we all know that the latter shut down,
probably in part because the attempted traffic-control mechanisms made
the whole network so unwieldy that it never worked.
Right, so let's solve this problem. Palladium/TCPA solves the problem
in one
Anonymous wrote:
... the file-trading network Gnutella is being threatened by
misbehaving clients. In response, the developers are looking at limiting
the network to only authorized clients:
This is the wrong solution. One of the important factors in the
Internet's growth was that the IETF
eWEEK July 8, 2002
It's Time to Abandon Insecure Languages
The security of the internet took a one-two combo to the gut ...
Ugh, looks like the English language did too. :-)
These holes
demonstrate that we must switch to writing security-sensitive code in
managed environments, like the
Peter Gutmann wrote:
Actually I'm amazed no printer vendor has ever gone after companies who produce
third-party Smartchips for remanufactured printer cartridges. This sounds like
the perfect thing to hit with the DMCA universal hammer.
There is no copyright issue, though. The DMCA only
Ross Anderson wrote:
... that means making sure the PC is the hub of the
future home network; and if entertainment's the killer app, and DRM is
the key technology for entertainment, then the PC must do DRM.
Recently there have been a number of articles pointing out how much
money Microsoft
Lucky Green wrote:
I share John's dislike for the (thoroughly ineffective, except in making
the lives of legitimate users more difficult) anti-spam zealots ...
Actually I'm not sure it has been completely ineffective. Cutting the
numbers of open relays won't be an effective anti-spam measure
Ed Gerck wrote:
A
scalable strategy would be a queue system for distributing load to
a pool of servers and a rating system for early rejection of repeated
bad queries from a source.
You could also vary the amount of hashcash required depending on the
number of bad signatures you are
David G. Koontz wrote:
Can you imagine watermarks on billboard advertisements? How subliminal.
Actually this would be weird. Suppose digital cameras had to be fitted
with a watermark detection system. Suddenly, we have lost a much more
fundamental fair use right -- the right to include
Will Knight wrote:
I'd be interested to know what people think of this story and whether
anyone is aware of any similarly unusual encryption systems.
Sounds a bit reminiscent of the steganographic spam:
http://spammimic.com/
The current implementation is not keyed so it would be very easy
John Gilmore wrote:
Brad Templeton has been kicking around some ideas on how to make
zero-UI encryption work (with some small UI available for us experts
who care more about our privacy than the average joe).
That's an interesting article. I wrote Whisper
(http://234.cx/whisper.php) as a
16 matches
Mail list logo