Re: Challenge to David Wagner on TCPA

2002-08-01 Thread James A. Donald
-- On 31 Jul 2002 at 23:45, AARG! Anonymous wrote: So TCPA and Palladium could restrict which software you could run. They aren't designed to do so, but the design could be changed and restrictions added. Their design, and the institutions and software to be designed around them, is

Re: Challenge to David Wagner on TCPA

2002-08-01 Thread Eric Murray
On Wed, Jul 31, 2002 at 11:45:35PM -0700, AARG! Anonymous wrote: Peter Trei writes: AARG!, our anonymous Pangloss, is strictly correct - Wagner should have said could rather than would. So TCPA and Palladium could restrict which software you could run. TCPA (when it isn't turned off)

Re: building a true RNG

2002-08-01 Thread John S. Denker
1) There were some very interesting questions such as -- whether one can construct a hash function that generates all possible codes. -- ditto, generating them as uniformly as possible. -- Whether off-the-shelf hash functions such as SHA-1 have such properties. The answers are

Re: building a true RNG

2002-08-01 Thread Paul Crowley
David Wagner [EMAIL PROTECTED] writes: I don't know of any good cryptographic hash function that comes with a proof that all outputs are possible. However, it might not be too hard to come up with plausible examples. For example, if we apply the Luby-Rackoff construction (i.e., 3 rounds of

Re: building a true RNG

2002-08-01 Thread David Wagner
David Wagner [EMAIL PROTECTED] writes: I don't know of any good cryptographic hash function that comes with a proof that all outputs are possible. However, it might not be too hard to come up with plausible examples. For example, if we apply the Luby-Rackoff construction (i.e., 3

Re: Challenge to David Wagner on TCPA

2002-08-01 Thread R. Hirschfeld
From: James A. Donald [EMAIL PROTECTED] Date: Tue, 30 Jul 2002 20:51:24 -0700 On 29 Jul 2002 at 15:35, AARG! Anonymous wrote: both Palladium and TCPA deny that they are designed to restrict what applications you run. The TPM FAQ at

Re: Challenge to David Wagner on TCPA

2002-08-01 Thread AARG!Anonymous
Eric Murray writes: TCPA (when it isn't turned off) WILL restrict the software that you can run. Software that has an invalid or missing signature won't be able to access sensitive data[1]. Meaning that unapproved software won't work. [1] TCPAmain_20v1_1a.pdf, section 2.2 We need to

Re: Challenge to David Wagner on TCPA

2002-08-01 Thread Jay Sulzberger
On Thu, 1 Aug 2002, AARG!Anonymous wrote: Eric Murray writes: TCPA (when it isn't turned off) WILL restrict the software that you can run. Software that has an invalid or missing signature won't be able to access sensitive data[1]. Meaning that unapproved software won't work.

RE: Challenge to David Wagner on TCPA

2002-08-01 Thread James A. Donald
-- On 2 Aug 2002 at 3:31, Sampo Syreeni wrote: More generally, as long as we have computers which allow data to be addressed as code and vice versa, the ability to control use of data will necessarily entail ability to control use of code. So, either we will get systems where

TCPA

2002-08-01 Thread James A. Donald
-- In an anarchist society, or in a world where government had given up on copyright and intellectual property, TCPA/Palladium would be a great thing, a really good substitute for law, much more effectual, much cheaper, and much less dangerous than law. In a world where we have