John Gilmore wrote:
...
PPS: On a consulting job one time, I helped my customer patch out the
license check for some expensive Unix circuit simulation software they
were running. They had bought a faster, newer machine and wanted to
run it there instead of on the machine they'd bought the "node
On May 29, 2009, at 8:48 AM, Peter Gutmann wrote:
Jerry Leichter writes:
For the most part, software like this aims to keep reasonably honest
people honest. Yes, they can probably hire someone to hack around
the
licensing software. (There's generally not much motivation for J
Random User
Jerry Leichter writes:
>For the most part, software like this aims to keep reasonably honest
>people honest. Yes, they can probably hire someone to hack around the
>licensing software. (There's generally not much motivation for J
>Random User to break this stuff, since it protects busines
>Their product inserts program code into
> existing applications to make those applications monitor and report
> their own usage and enforce the terms of their own licenses, for
> example disabling themselves if the central database indicates that
> their licensee's subsc
This is getting a bit far afield from cryptography, but proper threat
analysis is still relevant.
On May 27, 2009, at 4:07 AM, Ray Dillinger wrote:
On Tue, 2009-05-26 at 18:49 -0700, John Gilmore wrote:
It's a little hard to help without knowing more about the situation.
I.e. is this a softw
On Wed, May 27, 2009 at 2:01 AM, Darren J Moffat wrote:
> John Gilmore wrote:
>>
>> It's only the DRM fanatics whose installed bases of customers
>> are mentally locked-in despite the crappy user experience (like
>> the brainwashed hordes of Apple users, or the Microsoft victims)
>> who are troubl
The introduction of the acronym "DRM" has drawn all the hysteria it
always does.
The description you've posted much more closely matches license (or
sometimse entitlement) management software than DRM. There are many
companies active in this field. Many are small, but Microsoft sells
so
John Gilmore wrote:
It's only the DRM fanatics whose installed bases of customers
are mentally locked-in despite the crappy user experience (like
the brainwashed hordes of Apple users, or the Microsoft victims)
who are troublesome. In such cases, the community should
I assume the Apple referen
On Tue, 2009-05-26 at 18:49 -0700, John Gilmore wrote:
> It's a little hard to help without knowing more about the situation.
> I.e. is this a software company? Hardware? Music? Movies?
> Documents? E-Books?
It's a software company.
> Is it trying to prevent access to something, or
> the c
It's a little hard to help without knowing more about the situation.
I.e. is this a software company? Hardware? Music? Movies?
Documents? E-Books? Is it trying to prevent access to something, or
the copying of something? What's the something? What's the threat
model? Why is the company tryi
10 matches
Mail list logo