On Wed, Jun 26, 2002 at 03:57:15PM -0400, C Wegrzyn wrote:
> If a DRM system is based on X.509, according to Brand I thought you could
> get anonymity in the transaction. Wouldn't this accomplish the same thing?
I don't mean that you would necessarily have to correlate your viewing
habits with yo
http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
Ross
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
On Wed, Jun 26, 2002 at 10:01:00AM -0700, bear wrote:
> As I see it, we can get either privacy or DRM,
> but there is no way on Earth to get both.
> [...]
Hear, hear! First post on this long thread that got it right.
Not sure what the rest of the usually clueful posters were thinking!
DRM syst
On Wed, 26 Jun 2002, Donald Eastlake 3rd wrote:
> "Privacy", according to the usual definitions, involve controlling the
> spread of information by persons autorized to have it. Contrast with
> secrecy which primarily has to do with stopping the spread of
> information through the actions of tho
I wrote:
> > Perhaps we are using
> > wildly divergent notions of "privacy"
Donald Eastlake 3rd wrote:
> You are confusing privacy with secrecy
That's not a helpful remark. My first contribution to
this thread called attention to the possibility of
wildly divergent notions of "privacy".
Als
Donald Eastlake 3rd wrote:
> On Tue, 25 Jun 2002, John S. Denker wrote:
>
>
>>Date: Tue, 25 Jun 2002 22:21:36 -0400
>>From: John S. Denker <[EMAIL PROTECTED]>
>>To: Dan Geer <[EMAIL PROTECTED]>, [EMAIL PROTECTED],
>> [EMAIL PROTECTED], [EMAIL PROTECTED]
>>Subject: Re: privacy <> digital righ
Do you really mean that if I'm a business, you can force me to deal with
you even though you refuse to supply your real name? Not acceptable.
I won't give up the right NOT to do business with anonymous customers,
or anyone else with whom I choose not to do business.
The point about DRM, if I und
Folks, H2K2 is the next in the line of New York City hackerconferences
organized by volunteers and 2600. Panels of particular interest to this
list might include "Crypto for the Masses," "Databases and Privacy,"
"Educating Lawmakers - Is It Possible?," and "Secure Telephony."
Hope to see you all
At the end of describing an "end of the GPL as we know it. Film at 11."
scenario, Ross asks:
> Can anyone from HP comment on whether this is actually their plan?
I "can't", in the sense of not being an Official HP Spokesdroid; but I'd
very much like to, being known to a good few of you, and havi
I'm slightly confused about this. My understanding of contract law is
that five things are required to form a valid contract: offer and
acceptance, mutual intent, consideration, capacity, and lawful
intent. It seems to me that a click-through agreement is likely to
fail on at least one, and poss
On Wed, 26 Jun 2002, Scott Guthery wrote:
>Privacy abuse is first and foremost the failure
>of a digital rights management system. A broken
>safe is not evidence that banks shouldn't use
>safes. It is only an argument that they shouldn't
>use the safe than was broken.
>
>I'm hard pressed to i
> I'm hard pressed to imagine what privacy without
> DRM looks like. Perhaps somebody can describe
> a non-DRM privacy management system. On the other
> hand, I easily can imagine how I'd use DRM
> technology to manage my privacy.
Oh please, this is absurd. How hard is it to violate my privac
12 matches
Mail list logo