--
On 31 Jul 2002 at 23:45, AARG! Anonymous wrote:
So TCPA and Palladium could restrict which software you could
run. They aren't designed to do so, but the design could be
changed and restrictions added.
Their design, and the institutions and software to be designed
around them, is
On Wed, Jul 31, 2002 at 11:45:35PM -0700, AARG! Anonymous wrote:
Peter Trei writes:
AARG!, our anonymous Pangloss, is strictly correct - Wagner should have
said could rather than would.
So TCPA and Palladium could restrict which software you could run.
TCPA (when it isn't turned off)
1) There were some very interesting questions such as
-- whether one can construct a hash function that
generates all possible codes.
-- ditto, generating them as uniformly as possible.
-- Whether off-the-shelf hash functions such as SHA-1
have such properties.
The answers are
David Wagner [EMAIL PROTECTED] writes:
I don't know of any good cryptographic hash function that comes with
a proof that all outputs are possible. However, it might not be too
hard to come up with plausible examples. For example, if we apply the
Luby-Rackoff construction (i.e., 3 rounds of
David Wagner [EMAIL PROTECTED] writes:
I don't know of any good cryptographic hash function that comes with
a proof that all outputs are possible. However, it might not be too
hard to come up with plausible examples. For example, if we apply the
Luby-Rackoff construction (i.e., 3
From: James A. Donald [EMAIL PROTECTED]
Date: Tue, 30 Jul 2002 20:51:24 -0700
On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
both Palladium and TCPA deny that they are designed to restrict
what applications you run. The TPM FAQ at
Eric Murray writes:
TCPA (when it isn't turned off) WILL restrict the software that you
can run. Software that has an invalid or missing signature won't be
able to access sensitive data[1]. Meaning that unapproved software
won't work.
[1] TCPAmain_20v1_1a.pdf, section 2.2
We need to
On Thu, 1 Aug 2002, AARG!Anonymous wrote:
Eric Murray writes:
TCPA (when it isn't turned off) WILL restrict the software that you
can run. Software that has an invalid or missing signature won't be
able to access sensitive data[1]. Meaning that unapproved software
won't work.
--
On 2 Aug 2002 at 3:31, Sampo Syreeni wrote:
More generally, as long as we have computers which allow data to
be addressed as code and vice versa, the ability to control use
of data will necessarily entail ability to control use of code.
So, either we will get systems where
--
In an anarchist society, or in a world where government had given
up on copyright and intellectual property, TCPA/Palladium would be
a great thing, a really good substitute for law, much more
effectual, much cheaper, and much less dangerous than law.
In a world where we have
10 matches
Mail list logo