Hi:

This is interesting, but hacking into any of the stand-alone digital readers seems like an easy task. My PC recognizes it and, perhaps, even this BrailleNote. Any hacker worth their weight could grab all the hidden files in a very few minutes.

Have you heard this from the NLS? I could download books and change the file type using a conversion program; so, I do not see the point of this argument.

And, no, I have no intension to do anything sneaky. I have read and signed the Bard agreements and warnings.


                JD Townsend
                Helping the light dependent to see.


Daytona Beach, Florida, Earth

----- Original Message -----
From: Joseph Lee <[email protected]
To: BrailleNote List <[email protected]
Date sent: Sat, 20 Mar 2010 14:09:08 -0700
Subject: Re: [Braillenote] USA - digital books



---- Original Message ------
From: Flint Million <[email protected]
Subject: Re: [Braillenote] USA - digital books
Date sent: Sat, 20 Mar 2010 15:48:06 -0500

The NLS seems very against the idea of allowing any
device aside
from
dedicated players to play the content.

Here's why:

The NLS's authorization system is completely
dependent on a
handful of
secret decryption keys. The algorithms and
procedures are
completely
open, and the algorithms themselves are industry
standard, open
source
techniques. This is actually the best way to
implement a crypto
system
- you don't want any of the security to be by
obscurity.

however, what we're dealing with is a DRM system.
The downfall
of any
DRM system is the very fact that there must be a way
for hte
content
to be decrypted by a legal user. Take DVD players
for example.
The
content on the discs is encrypted so cannot be
easily copied.
However,
your DVD player must have the decryption keys inside
of it in
order to
be able to decrypt the content for legal playback.
If your
player did
not have the keys, the content would be secure -
against
everyone,
including the legal users!

To make matters worse, allowing DRM decryption on a
standard PC
(like
with DVD playback software and so on) opens up the
gate for
millions
and millions of hackers to tear into the code,
disassembling it,
studying it, and inevitably gathering the necessary
decryption
keys.
Armed with these keys, a user then need only apply
them to the
encrypted content to retrieve the completely
unprotected data
___
Replies to this message will go directly to the
sender.
If your reply would be useful to the list, please
send a
copy to the list as well.

To leave the BrailleNote list, send a blank message
to
[email protected]
To view the list archives or change your
preferences, visit
http://list.humanware.com/mailman/listinfo/brailleno
te


___
Replies to this message will go directly to the sender.
If your reply would be useful to the list, please send a
copy to the list as well.

To leave the BrailleNote list, send a blank message to
[email protected]
To view the list archives or change your preferences, visit
http://list.humanware.com/mailman/listinfo/braillenote

Reply via email to