Re: Hollywood Hackers

2002-07-31 Thread Eugen Leitl
On Tue, 30 Jul 2002, James A. Donald wrote: The plan, already implemented, is to flood file sharing systems with bogus files or broken files. The solution, not yet implemented, is to attach digital signatures to files, and have the file sharing software recognize certain signatures as good

Re: Hollywood Hackers

2002-07-31 Thread James A. Donald
-- On 29 Jul 2002 at 14:25, Duncan Frissell wrote: Congressman Wants to Let Entertainment Industry Get Into Your Computer Rep. Howard L. Berman, D-Calif., formally proposed legislation that would give the industry unprecedented new authority to secretly hack into

Re: Hollywood Hackers

2002-07-31 Thread Anonymous
On Tue, 30 Jul 2002 20:51:24 -0700, you wrote: When we approve a file, all the people who approved it already get added to our trust list, thus helping us select files, and we are told that so and so got added to our list of people who recommend good files. This gives people an incentive to

Re: Challenge to David Wagner on TCPA

2002-07-31 Thread James A. Donald
-- On 29 Jul 2002 at 15:35, AARG! Anonymous wrote: both Palladium and TCPA deny that they are designed to restrict what applications you run. The TPM FAQ at http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads They deny that intent, but physically they have that

Re: Choate's Freedom to Dissociate

2002-07-31 Thread Jim Choate
On Tue, 30 Jul 2002, Major Variola (ret) wrote: At 07:59 PM 7/29/02 -0500, Jim Choate wrote: On Mon, 29 Jul 2002, Eric Murray wrote: Your ISP may be blocking mail from Ssz to you. Sue their ass your right to free association is being violated! Um, right after we finish sueing other

Re: Challenge to David Wagner on TCPA

2002-07-31 Thread AARG! Anonymous
James Donald wrote: On 29 Jul 2002 at 15:35, AARG! Anonymous wrote: both Palladium and TCPA deny that they are designed to restrict what applications you run. The TPM FAQ at http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads They deny that intent, but physically they have

Re: Hollywood Hackers

2002-07-31 Thread Steve Schear
At 11:01 AM 7/31/2002 +0200, Eugen Leitl wrote: On Tue, 30 Jul 2002, James A. Donald wrote: The plan, already implemented, is to flood file sharing systems with bogus files or broken files. The solution, not yet implemented, is to attach digital signatures to files, and have the file

Re: Hollywood Hackers

2002-07-31 Thread Eugen Leitl
On Wed, 31 Jul 2002, Anonymous wrote: Such an approach suffers from the bad guy occasionally signing a good file, thus placing himself on the trusted signer list. This assumes a boolean trust metric. What you need is a trust scalar, and a mechanism to prevent Malory poisoning it. It should

Re: A QA exchange between me and Eugene Volokh

2002-07-31 Thread Steve Schear
At 08:06 AM 7/31/2002 -0700, A.Melon wrote: What do you have to hide? If I have nothing to hide, nobody wants to know. steve

Re: Challenge to David Wagner on TCPA

2002-07-31 Thread Declan McCullagh
I imagine there's a world of difference between will and would. -Declan On Mon, Jul 29, 2002 at 03:35:32PM -0700, AARG!Anonymous wrote: Can you find anything in this spec that would do what David Wagner says above, restrict what applications you could run? Despite studying this spec for

Re: Hollywood Hackers

2002-07-31 Thread Graham Lally
Anonymous wrote: On Tue, 30 Jul 2002 20:51:24 -0700, you wrote: When we approve a file, all the people who approved it already get added to our trust list, thus helping us select files, and we are told that so and so got added to our list of people who recommend good files. This gives people

Re: Challenge to David Wagner on TCPA

2002-07-31 Thread Jay Sulzberger
On Tue, 30 Jul 2002, James A. Donald wrote: -- On 29 Jul 2002 at 15:35, AARG! Anonymous wrote: both Palladium and TCPA deny that they are designed to restrict what applications you run. The TPM FAQ at http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads They deny

Re: Challenge to David Wagner on TCPA

2002-07-31 Thread Nicko van Someren
On Wednesday, July 31, 2002, at 04:51 am, James A. Donald wrote: On 29 Jul 2002 at 15:35, AARG! Anonymous wrote: both Palladium and TCPA deny that they are designed to restrict what applications you run. The TPM FAQ at http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads

Re: Challenge to David Wagner on TCPA

2002-07-31 Thread Peter Fairbrother
AARG! Anonymous wrote: James Donald wrote: On 29 Jul 2002 at 15:35, AARG! Anonymous wrote: both Palladium and TCPA deny that they are designed to restrict what applications you run. The TPM FAQ at http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads They deny that intent, but

White House Sounds Call For New Internet Standards

2002-07-31 Thread Steve Schear
WHITE HOUSE SOUNDS CALL FOR NEW INTERNET STANDARDS The Bush administration's cyber security czar, Richard Clarke, said it might be time to replace the creaky, cranky 20-year-old protocols that drive the Internet with standards better able to accommodate a flood of new wireless devices. Wireless

Re: Hollywood Hackers

2002-07-31 Thread James A. Donald
-- On 31 Jul 2002 at 11:01, Eugen Leitl wrote: The issue of node reputation is completely orthogonal to the document hashes not colliding. Reputation based systems are useful, because document URI http://localhost:4711/f70539bb32961f3d7dba42a9c51442c1218a9100 doesn't say what's in

Re: Challenge to David Wagner on TCPA

2002-07-31 Thread James A. Donald
-- 29 Jul 2002 at 15:35, AARG! Anonymous wrote: both Palladium and TCPA deny that they are designed to restrict what applications you run. James A. Donald: They deny that intent, but physically they have that capability. On 31 Jul 2002 at 16:10, Nicko van Someren wrote: And all

Re: Hollywood Hackers

2002-07-31 Thread Jack Lloyd
On Wed, 31 Jul 2002, Steve Schear wrote: Looks amazingly familiar. Could it be, could be, could it be Mojo Nation (now MNet http://mnet.sourceforge.net )? Or OpenCM (http://www.opencm.org) -Jack

Re: Hollywood Hackers

2002-07-31 Thread James A. Donald
-- James A. Donald: The plan, already implemented, is to flood file sharing systems with bogus files or broken files. The solution, not yet implemented, is to attach digital signatures to files, and have the file sharing software recognize certain signatures as good or bad. Eugen

Re: Pizza with a credit card

2002-07-31 Thread Michael Motyka
One useful piece of advice: Don't but pizza with a credit card: SNIP Course all those terrorists buying their pizzas with cash get away clean. I've wondered for years how much longer this will be allowed. Cash is still viable. Not as viable as it was 10, or even 5 years ago.

Re: Hollywood Hackers

2002-07-31 Thread A.Melon
Jack Lloyd wrote: On Wed, 31 Jul 2002, Steve Schear wrote: Looks amazingly familiar. Could it be, could be, could it be Mojo Nation (now MNet http://mnet.sourceforge.net )? Or OpenCM (http://www.opencm.org) -Jack On the OpenCM webpage, it proclaims on the right hand side: OpenCM