Quoting Oleg Goldshmidt, from the post of Wed, 15 Jan:
>
> "[Transmeta] claims its approach offers increased security for wireless
> computing, protects sensitive data, "deters intellectual property
> theft" (read Digital Rights Management (DRM) Inside) and delivers
> tamper-resistant, x86 storage
Quoth Oleg Goldshmidt on Thu, Jan 16, 2003:
> I kleft a very good job once because there was a working camera at the
> office.
Yikes. What kind of place is that? (No, don't answer that.)
Vadik.
--
Time is an illusion. Lunchtime doubly so.
-- Ford Prefect
On Thursday 16 January 2003 03:42, Gilad Ben-Yossef wrote:
>
> Men are control freaks - we love to control other people. Power turns us
> on. This isn't new - that one of the basic themes of the Lord of the
> Ring, for example and that story is 30 years old.
The story is about fifty years old :-)
the transmeta inner cryptology modules sounds/looks a lot like
tcpa and his associated big brother "palladium".
those days, fighting DMCA-like laws and tools is important.
check this one : http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
and make up your own mind !
maybe the
On 2003-01-15, Gilad Ben-Yossef wrote:
> Men are control freaks - we love to control other people. Power turns us
> on. This isn't new - that one of the basic themes of the Lord of the
> Ring, for example and that story is 30 years old.
>
Hmm, I'd say the idea is a bit older than even 30 years. I
Vadim Vygonets <[EMAIL PROTECTED]> writes:
> In this case, you seem to be sufficiently paranoid to look for
> security cameras in your room (don't get me wrong, paranoia is good
> if you work with security (and you obviously do)).
I kleft a very good job once because there was a working camera at
On Wed, 2003-01-15 at 16:50, Vadim Vygonets wrote:
> Quoth Mark Veltzer on Wed, Jan 15, 2003:
> > As for Linus: I do not consider a person who had the nerve to write an
> > operating system from scratch and license it under the GPL a traitor. A hero
> > hits much closer to home.
>
> Come on. Wr
Quoth Mark Veltzer on Wed, Jan 15, 2003:
> As for Linus: I do not consider a person who had the nerve to write an
> operating system from scratch and license it under the GPL a traitor. A hero
> hits much closer to home.
Come on. Writing Linux is not a political issue. He may be a
good program
Quoth Oleg Goldshmidt on Wed, Jan 15, 2003:
> Vadim Vygonets <[EMAIL PROTECTED]> writes:
> > Come on! Building crypto into the processor and enhancing
> > security is a GOOD THING[TM], *despite* the fact that DRM was
> > mentioned _by a third party_ in an article about the processor in
> > questio
On Wed, 2003-01-15 at 13:29, Oleg Goldshmidt wrote:
> Actually, the passage I cited presents "deters intellectual property
> theft" as a direct quote. Of course security is good, but I would not
> want a "trusted," if secure, CPU in my computer, even if made by
> Transmeta.
Oleg, have you noticed
Vadim Vygonets <[EMAIL PROTECTED]> writes:
> Quoth Oleg Goldshmidt on Wed, Jan 15, 2003:
> > "[Transmeta] claims its approach offers increased security for wireless
> > computing, protects sensitive data, "deters intellectual property
> > theft" (read Digital Rights Management (DRM) Inside) and de
On Wednesday 15 January 2003 22:05, you wrote:
> "[Transmeta] claims its approach offers increased security for wireless
> computing, protects sensitive data, "deters intellectual property
> theft" (read Digital Rights Management (DRM) Inside) and delivers
> tamper-resistant, x86 storage environmen
t; <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, January 15, 2003 10:05 PM
Subject: [OT] is Linus really a traitor?
>
> "[Transmeta] claims its approach offers increased security for wireless
> computing, protects sensitive data, "deters intellectu
Quoth Oleg Goldshmidt on Wed, Jan 15, 2003:
> "[Transmeta] claims its approach offers increased security for wireless
> computing, protects sensitive data, "deters intellectual property
> theft" (read Digital Rights Management (DRM) Inside) and delivers
> tamper-resistant, x86 storage environments.
"[Transmeta] claims its approach offers increased security for wireless
computing, protects sensitive data, "deters intellectual property
theft" (read Digital Rights Management (DRM) Inside) and delivers
tamper-resistant, x86 storage environments."
http://212.100.234.54/content/3/28883.html
--
15 matches
Mail list logo