On Fri, 22 Dec 2000, Adam Langley wrote:
> On Fri, Dec 22, 2000 at 01:02:13PM -0800, Mr . Bad wrote:
> > Hey, where's this article from? Need an URL or at least a publication.
>
> Look at t13.org, and search the page for a link to e00148r2.pdf (that
> has the ATA spec in it).
>
> At the end of that is a link to http://www.lmicp.com. This seems to be the core
> of the evil. Try:
> http://www.dtcp.com/data/dtcp_public.pdf (slide overview, big)
> and
> http://www.dtcp.com/data/DTCP_spec11_informational.pdf (technical overview)
>
> Quick run down:
> * Uses digitally signed messages (using an EC version of DSA, I wonder what
> distributed.net's next crack will be?)
> * Devices Challenge each other to see if the 'sink' device is 'legally' allowed
> to store the information
> * Support for viral revokations of devices
> * No mention of software working, but I guess it acts like a device. So we need
> to get the debuggers out and read the right data out of the binary, then
> deploy anti-virus stuff to stop any revokation measures getting in.
It seems to me that any hardware protection could be trivially
circumvented by naughty software.
This seems like a legitimate proposal for little gadgets like portable MP3
players, DVD recorders, etc. But hard disks? Without cooperative software
it's hopeless. Right?
--
Mark Roberts
[EMAIL PROTECTED]
_______________________________________________
Freenet-chat mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/mailman/listinfo/freenet-chat