Re: consulting question.... (DRM)

2009-05-29 Thread Peter Gutmann
Jerry Leichter writes: >For the most part, software like this aims to keep reasonably honest >people honest. Yes, they can probably hire someone to hack around the >licensing software. (There's generally not much motivation for J >Random User to break this stuff, since it protects busines

NYT: "Pentagon Plans New Arm to Wage Wars in Cyberspace"

2009-05-29 Thread Perry E. Metzger
Full article: http://www.nytimes.com/2009/05/29/us/politics/29cyber.html -- Perry E. Metzgerpe...@piermont.com - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metz

Re: End-of-chapter questions for "Practical Cryptography"?

2009-05-29 Thread Your Monkey Overlord
On Fri, May 22, 2009 at 7:55 AM, Perry E. Metzger wrote: > may be mistaken but I'm not aware of any significantly superior > alternatives. What about Mao's *Modern Cryptography* ? As for Paul's question, maybe we can collaborate as a list on fun questions for readers of *Practical*. --

What will happen to your crypto keys when you die?

2009-05-29 Thread Udhay Shankar N
Fascinating discussion at boing boing that will probably be of interest to this list. http://www.boingboing.net/2009/05/27/what-will-happen-to.html Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The

white-box crypto Was: consulting question....

2009-05-29 Thread Brecht Wyseur
2009/5/27 Alexander Klimov mailto:alser...@inbox.ru>>: > On Tue, 26 May 2009, James Muir wrote: >> There is some academic work on how to protect crypto in software from >> reverse engineering. Look-up "white-box cryptography". >> >> Disclosure: the company I work for does white-box crypto. > > Co

Neat idea

2009-05-29 Thread Jerry Leichter
Using retransmissions for steganography. http://arxiv.org/pdf/0905.0363v3 -- Jerry - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to maj

Re: white-box crypto Was: consulting question....

2009-05-29 Thread James Muir
Alexander Klimov wrote: > On Tue, 26 May 2009, James Muir wrote: >> There is some academic work on how to protect crypto in software from >> reverse engineering. Look-up "white-box cryptography". >> >> Disclosure: the company I work for does white-box crypto. > > Could you explain what is the po

Re: consulting question.... (DRM)

2009-05-29 Thread John Gilmore
>Their product inserts program code into > existing applications to make those applications monitor and report > their own usage and enforce the terms of their own licenses, for > example disabling themselves if the central database indicates that > their licensee's subsc